IoT firm Ubiquiti hit by 'catastrophic' data breach
Intruders allegedly gained administrative access to Ubiquity’s servers
Update: “In response to this incident, we leveraged external incident response experts to conduct a thorough investigation to ensure the attacker was locked out of our systems,” Ubiquiti has said in a message to its community, adding that the experts found no evidence that would suggest that customer information was accessed. The company says it is working with law enforcement agencies and has “well-developed evidence” that the perpetrator was an individual with intricate knowledge of Ubiquiti's cloud infrastructure.
An anonymous whisteblower has claimed that Internet of Things (IoT) specialists Ubiquiti massively downplayed its recent system breach.
Ubiquity urged its customers to change their passwords blaming in January 2021 after claiming an incident at a third-party cloud provider may have exposed authentication information.
However, this was apparently false information given out at the behest of the company’s legal department apparently to protect Ubiquity’s share price, the anonymous letter to the European Data Protection Supervisor claims.
We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.
- These are the best endpoint protection tools
- Check our list of the best firewall apps and services
- And here are the best disaster recovery services
According to the letter, which the whistleblower shared with leading cybersecurity expert Brian Krebs, the breach potentially put all Ubiquiti devices at risk.
Downplaying the incident
The whistleblower shared that the attackers had gained administrative access to Ubiquiti’s cloud servers at Amazon Web Service (AWS) and accessed all S3 data buckets, all application logs, all databases, all user database credentials, and secrets required to forge single sign-on (SSO) cookies.
In the letter, the whistleblower alleges that Ubiquiti’s security noticed something was amiss in late December last year, and soon found a backdoor left by the intruders.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Removing the backdoor invited a ransom note from the intruder threatening to expose the breach along with details of another backdoor. Ubiquiti however didn’t engage with the intruders and found and closed the second backdoor.
“Ubiquiti had negligent logging (no access logging on databases) so it was unable to prove or disprove what they accessed, but the attacker targeted the credentials to the databases, and created Linux instances with networking connectivity to said databases,” wrote the whistleblower in the letter reiterating that it was the company’s legal department that overrode repeated requests to take stringent action.
- Protect your devices with these best antivirus software
Via: KrebsOnSecurity
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.