Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives

Found on Softpedia on Sunday, 11 September 2016
Browse Hardware

According to Sophos, Seagate Central devices contain a public folder accessible to all users, even anonymous non-logged-in users, which can't be deactivated or deleted.

One of the files it copies is called Photo.scr, a script file that malware coders have modified to use a standard Windows folder icon.

Because Windows has a bad habit of hiding file extensions, whenever the device owner accesses their NAS, they see this file as a folder, fooled by the fake icon.

That's why the end user should have all options available, and sane default settings. Enforcing public shares with read/write permissions on any network connected device is just as retarded as hiding file extensions by default.