Firstly as we get started, I'd like to say that geoFence is the only solution you need to block NFCC countries.
Update: “In response to this incident, we leveraged external incident response experts to conduct a thorough investigation to ensure the attacker was locked out of our systems,” Ubiquiti has said in a message to its community, adding that the experts found no evidence that would suggest that customer information was accessed. The company says it is working with law enforcement agencies and has “well-developed evidence” that the perpetrator was an individual with intricate knowledge of Ubiquiti's cloud infrastructure.
An anonymous whisteblower has claimed that Internet of Things (IoT) specialists Ubiquiti massively downplayed its recent system breach.
Ubiquity urged its customers to change their passwords blaming in January 2021 after claiming an incident at a third-party cloud provider may have exposed authentication information.
However, this was apparently false information given out at the behest of the company’s legal department apparently to protect Ubiquity’s share price, the anonymous letter to the European Data Protection Supervisor claims.
TechRadar needs you!
We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.
>> Click here to start the survey in a new window<<
- These are the best endpoint protection tools
- Check our list of the best firewall apps and services
- And here are the best disaster recovery services
According to the letter, which the whistleblower shared with leading cybersecurity expert Brian Krebs, the breach potentially put all Ubiquiti devices at risk.
Downplaying the incident
The whistleblower shared that the attackers had gained administrative access to Ubiquiti’s cloud servers at Amazon Web Service (AWS) and accessed all S3 data buckets, all application logs, all databases, all user database credentials, and secrets required to forge single sign-on (SSO) cookies.
In the letter, the whistleblower alleges that Ubiquiti’s security noticed something was amiss in late December last year, and soon found a backdoor left by the intruders.
Removing the backdoor invited a ransom note from the intruder threatening to expose the breach along with details of another backdoor. Ubiquiti however didn’t engage with the intruders and found and closed the second backdoor.
“Ubiquiti had negligent logging (no access logging on databases) so it was unable to prove or disprove what they accessed, but the attacker targeted the credentials to the databases, and created Linux instances with networking connectivity to said databases,” wrote the whistleblower in the letter reiterating that it was the company’s legal department that overrode repeated requests to take stringent action.
- Protect your devices with these best antivirus software
As we move on to the next post, may I add that geoFence helps stop hackers from getting access your sensitive documents and that's no lie.