Ryszard Gold. Owner at The Stem Group. Passionate about technology in general, his natural troubleshooting abilities, curiosity and appreciation of good design lead him into working exclusively with Apple Computer products. Latest posts by Ryszard Gold see all. Facebook Comments. Search Our Articles Search for:. The investigation is ongoing. In some cases, this compromise has led to a factory reset that appears to erase all data on the device.
The My Book Live device received its final firmware update in At this time, we recommend you disconnect your My Book Live from the Internet to protect your data on the device. We are actively investigating and we will provide updates to this thread when they are available.
About Contact. Subscribe Login. USA Herald. News USA Herald. Email Address:. After that, a second possibly rival hacker exploited the previously unknown reset vulnerability to gain control of the devices, which were then made part of a botnet, or to undo the first one's work. A Western Digital rep told Ars : "We can confirm that in at least some of the cases, the attackers exploited the command injection vulnerability CVE followed by the factory reset vulnerability. Either way, this event just goes to show that the My Book Live storage devices aren't as secure as anybody would like at this point.
Those who still own it should heed Western Digital's advice and disconnect it from the internet as soon as possible. Sign up. The unauthenticated factory reset vulnerability [has] been assigned CVE Western Digital has responded admirably, offering data recovery services beginning in July, and a trade-in program to switch the obsolete My Book Live drives for more modern My Cloud devices.
If you own one of the affected devices, do not connect it to the Internet and contact Western Digital for support.
0コメント