Saturday , May 8 2021

According to the whistleblower, Ubiquiti was shot by a “catastrophic” incident

Ubiquiti is known for its user-friendly and powerful hardware such as routers and WLAN access points. But now an insider is making serious claims. Image: watson

Well-known network supplier hit in a “disastrous” accident, according to the whistleblower

Network equipment supplier Ubiquiti is apparently being blackmailed and accused by a whistleblower of covering up a potentially major data breach. These are the most important questions and answers.

What happened?

How bad was the incident when US manufacturer Ubiquiti notified customers via email on January 11, 2021? The Verge summarized the latest alarming findings Thursday night. Ubiquiti is accused by a whistleblower of covering up a “catastrophic” security breach – and after 24 hours of silence, the company released a statement that none of the whistleblower’s allegations would be discussed.

Why is this important?

The Verge states that Ubiquiti has an excellent reputation. Routers and other network devices, also sold in Switzerland, belonged to the prosumer class. The company name has become synonymous with high security standards and user-friendly management.

The US manufacturer promises “seamless network integration” with its UniFi product line. Screenshot:

Initially, Ubiquiti had notified its customers on January 11 that there was a minor vulnerability in a “third-party cloud provider”, but on March 30, the famous cybersecurity website KrebsOnSecurity announced that the vulnerability was actually much worse than Ubiquiti wanted to admit.

A company whistleblower who spoke to Brian Krebs claims that Ubiquiti himself was hacked and that the company’s legal department was preventing efforts to fully educate customers about the dangers.

How can this be?

According to The Verge, it’s worth reading the report from the acclaimed IT security expert Krebs to see the full claims. As a result, the hackers had full access to the company’s AWS servers. This is because ubiquiti is supposedly Root admin login to LastPass account left rear.

Attackers could use the password manager to access all Ubiquiti network devices that customers have set up to control via the company’s cloud service. And this online service is apparently required for some new Ubiquiti hardware.

What does Ubiquiti say?

When Ubiquiti finally made a statement this week, it wasn’t exactly reassuring, says The Verge – “totally inadequate”.

The company reiterated its view that there is no evidence that user data was accessed or stolen.

As the cancer points The whistleblower clearly stated that the company did not keep any records of who accessed the hacked server. and who doesn’t. Ergo: He couldn’t have any proof.

Ubiquiti’s statement also confirms that the hacker tried to extort money from the company, but did not address allegations of cover-up.

Below, we reintroduce the original Ubiquiti statement issued by the US company after the cancer disclosure report:

“As we reported to you on January 11, we fell victim to a cybersecurity incident involving unauthorized access to our IT systems. According to Brian Krebs’ report, there is a new interest and interest in this topic and we would like to provide more information to our community.

Please note that nothing about our customer data analysis and the safety of our products has changed since our initial notification on January 11th. In response to this event, we used external incident response experts to conduct a thorough investigation to ensure that: the attacker remained outside of our systems.

These experts found no evidence that customer information was accessed or even targeted. The attacker, who unsuccessfully attempted to hijack the company by threatening to release stolen source code and certain IT credentials, never claimed to have access to customer information. This, along with other evidence, is the reason why we believe that customer data is not the target of the event or has not been accessed in any other way in connection with the event.

At this point, we have well-developed evidence that the perpetrator is an individual with complex knowledge of our cloud infrastructure. As we cooperate with law enforcement in an ongoing investigation, we cannot comment further.

All this, as a precaution, we recommend that you change your password if you haven’t done so before, including any website where you use the same user ID or password. We also recommend that you enable two-factor authentication on your Ubiquiti accounts if you haven’t already. »

these are:

Watson contacted Ubiquiti to comment on the allegations made by The Verge. An answer is pending.

What can Ubiquiti customers do?

The company has already asked buyers or users of Ubiquiti hardware to change the password for online access. They also need to enable two-factor authentication to prevent unauthorized third parties from gaining access.

However, customers can only wait and see if there is any more information leak about the event. If attackers resell customer data or post it online, this is likely to be known sooner or later.



Would you like to support Watson and journalism? Learn more

(You will be prompted to complete the payment)


15 CHF

25 CHF


The wildest computer attacks ever

This iPhone bug is ingeniously practical

You may also be interested in:

Subscribe to our newsletter

When the onion or garlic sprouts: is it edible or poisonous?

Potato sprouts and germination areas are known to be toxic: Eating potatoes can cause intestinal problems. Sprouted onions and garlic cloves are often thrown away. Is this a sensible measure or is it food waste?

There are many healthy foods in onions and garlic. For example, some help lower blood pressure and prevent heart attacks and strokes. This applies not only to the bulbous part of the onion vegetable, but also to the growing green.

Unlike the sprouting of potatoes, the green shoots of onions and garlic do not accumulate harmful substances. The onion part of the onion vegetable is not toxic after germination. In plain language: With …

Link to article

Source link