From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wols Lists Subject: Posting on RISKS - hacked NAS's Date: Sun, 25 Sep 2016 22:33:59 +0100 Message-ID: <57E842C7.9000302@youngman.org.uk> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Return-path: Sender: linux-raid-owner@vger.kernel.org To: linux-raid List-Id: linux-raid.ids Just for info. I know it's not really quite this list, but I can't quite make out what is affected. I get the impression this is referring to NAS systems, so it's outside our remit. But to me, "Seagate NAS" is actually a raid-suitable disk drive, so it makes me wonder whether it's hacked drive firmware... unlikely but eminently possible ... Cheers, Wol ------------------------------ Date: Fri, 23 Sep 2016 11:34:21 -0700 From: Gene Wirchenko Subject: "Seagate NAS hack should scare us all" (Roger A. Grimes) Roger A. Grimes, InfoWorld, 20 Sep 2016 An under-the-radar news story proves that computers are far from the only devices prey to attack http://www.infoworld.com/article/3121338/security/seagate-nas-hack-should-scare-us-all.html opening text: No fewer than 70 percent of Internet-connected Seagate NAS hard drives have been compromised by a single malware program. That's a pretty startling figure. Security vendor Sophos says the bitcoin-mining malware Miner-C is the culprit. [At peak, seek to tweak the weak link. This reeks of leaks that peek as well. PGN]