Skip to main content

5 lines of code allowed attackers to wipe tons of data from popular hard drive

Western Digital My Book Live was hit with an attack last week that led to countless drives being factory reset, resulting in petabytes of lost data. Originally, reports showed that the main attack exploited a security vulnerability from 2018, and although that is still one of the attack vectors, there was another one at play. And it came down to only five lines of code.

An investigation by Ars Technica revealed that a second exploit was at work in at least some of the affected drives. This second exploit allowed attackers to factory reset the drives remotely without a password. Curiously, the investigation revealed that five lines of code would have protected the reset command with a password, but they were removed from the running code.

Even stranger, this vulnerability wasn’t critical to the data loss. The original exploit (CVE-2018-18472) allowed attackers to gain root access to drives, stealing the data off of them before wiping the drive. This vulnerability was discovered in 2018, but Western Digital ended support for My Book Live in 2015. The security flaw was never fixed.

“We have reviewed log files which we have received from affected customers to understand and characterize the attack,” Western Digital wrote in a statement. “Our investigation shows that in some cases, the same attacker exploited both vulnerabilities on the device, as evidenced by the source IP. The first vulnerability was exploited to install a malicious binary on the device, and the second vulnerability was later exploited to reset the device.”

These two exploits achieved the same goal but with different means, leading an investigation from security firm Censys to speculate that they were the work of two different groups of hackers. The investigation says it’s possible that an original group of attackers exploited the root access vulnerabilities to loop the drives into a botnet (a network of computers that hackers can draw resources from). However, a possible second group of attackers came in and exploited the password reset vulnerability to lock out the original attackers.

The two exploits apply to My Book Live and My Book Live Duo storage devices. These drives give users a few terabytes of network-attached storage, which is why these attacks were able to happen in the first place. Western Digital says anyone with a My Book Live or My Book Live Duo should immediately disconnect the drive from the internet, even if it hasn’t come under attack.

Western Digital, a computer hard disk drive manufacturer and data storage company, is offering affected customers data recovery services, which will begin in July. A Western Digital spokesperson told Ars Technica that the services will be free. It is also offering customers a trade-in program to upgrade to a newer My Cloud device, though Western Digital hasn’t said when the program is launching.

Editors' Recommendations

Jacob Roach
Senior Staff Writer, Computing
Jacob Roach is a writer covering computing and gaming at Digital Trends. After realizing Crysis wouldn't run on a laptop, he…
How to create a bibliography in Word on Windows and Mac
A family using the computer to browse Fios internet together.

A bibliography is an important part of any well-structured college essay, dissertation, article, or other researched writing sample. It lets your readers know what sources you used as building blocks for your work, and isn’t too difficult to make without a template tool. Still, if you’d like to skip a few steps, there’s a terrific bibliography generator built right into Microsoft Word.

Read more
The unsung hero behind the modernization of Windows laptops
New Surface Laptop Studio 2 with a Surface Pen.

The large, multitouch trackpad was once synonymous with the MacBook. And starting in 2015, that has also included a haptic feedback trackpad, which simulates a physical click via a motorized engine under the surface. It was quite the revelation, and despite some initial skepticism, it really took off.

As you would expect, Apple held a patent on the technology, enjoying a five-year start ahead of other laptops. The first attempts at haptic feedback trackpads on Windows laptops weren't promising either.

Read more
How to create a Memoji on a Mac
Memoji creation screen in Messages on Mac.

Using emojis is a great way to add flair and personality to what would just be a plain ole’ text message. But if you’re an Apple devotee, you’ll also be able to liven your chats up with Memojis. Introduced on iOS 12, Memojis are custom avatars that you make in your likeness. Choose from numerous clothing, facial hair, and other cosmetic filters to dial in your appearance. When finished, your Memojis can be used with a few iOS apps, including Messages and FaceTime.

Read more