
I can not look into a chip and they know that! Who knows what they have done to the IC's in their harddisks to provide access to my data. I for one will never buy another device from Western. This is making sure by design they (and maybe their partners, workforce, ex-workforce and 3-letter agencies) have acces to your private data. How can it be possible that a big company like Western Digital constructs a backdoor to your personal data? Such a company - and it's owners - should shut down, prosecuted and put behind bars for many - many - years. Firmware 2.30.172 reportedly fixes the bug, so make sure your device is updated before reconnecting to the internet. An attacker could literally take over your WDM圜loud by just having you visit a website where an embedded iframe or img tag make a request to the vulnerable device using one of the many predictable default hostnames for the WDM圜loud such as 'wdmycloud' and 'wdmycloudmirror' etc." The My Cloud Storage devices affected by this backdoor include: M圜loud, M圜loudMirror, My Cloud Gen 2, My Cloud PR2100, My Cloud PR4100, My Cloud EX2 Ultra, My Cloud EX2, My Cloud EX4, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, and My Cloud DL4100. Not only that, but users locked to a LAN are not safe either. GulfTech Research and Development explains, "The triviality of exploiting this issues makes it very dangerous, and even wormable. To make matters worse, it was disclosed to Western Digital six months ago and the company did nothing.
WD MY BOOK EXTERNAL DRIVE LIGHT FLASHING DIM PASSWORD
It isn't even hard to take advantage of it - the username is "mydlinkBRionyg" and the password is "abc12345cba" (without quotes). You see, many Western Digital M圜loud NAS drives have a hardcoded backdoor, meaning anyone can access them - your files are at risk. BrianFagioli shares a report from BetaNews: Today, yet another security blunder becomes publicized, and it is really bad.
