
It took a couple minutes to generate the logs. The synology repeatedly obtains IPs like or 172.16.117.x or something like that. I’ve changed the router private IP from the 192.168.1.x network to 172.16.x.x network. The Synology was hacked and today was placed out on the DMZ for half the day. Anyway, I have since took any other lingering webdav IT clients and removed their Webdav services. Normally, the log take just a couple seconds to produce. I created a log that a couple minutes to produce and sent it over to Synology support. Right now, the synology and workstations that need access to it are off the internet grid so they can perform their work while I figure out how to resolve this issue. We're also using WebDAV for file access from portable devices like iPhone and Android mobiles. Not many ftp clients are integrating in the same way. Wasabi COS, IBM OSS Support Protocol - WebDAV (+secure), FTP (+secure), SFTP (+ED25519). Many NAS vendors recommend NetDrive as a standard way to mount their NAS products. RaiDrive makes cloud storage or NAS easily a network drive. I reset the router to factory defaults but the private network was altered again to a different network address scheme as soon I plugged the synology back in. Especially WebDrive and NetDrive are much better integrated into Windows comparing the limited browsability of the standard DAV client. NAS storage as virtual driveYou can connect to NAS servers by WebDAV or FTP. The hackers reconfigured the uverse router/modem and placed the Diskstation in the DMZ. Welp, my client got hacked yesterday in what I can only assume to be webdav service exploit.
