{"id":18121,"date":"2021-01-12T10:21:02","date_gmt":"2021-01-12T09:21:02","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=18121"},"modified":"2022-11-04T11:50:23","modified_gmt":"2022-11-04T10:50:23","slug":"hersteller-ubiquiti-gehackt-nutzer-sollten-passwrter-ndern","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/01\/12\/hersteller-ubiquiti-gehackt-nutzer-sollten-passwrter-ndern\/","title":{"rendered":"Vendor Ubiquiti hacked, users should change passwords"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/12\/hersteller-ubiquiti-gehackt-nutzer-sollten-passwrter-ndern\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A note to users, the products of the US manufacturer Ubiquiti Networks. The latter has fallen victim to a cyberattack, although the scope is still unclear. Over the weekend, their cloud offering was briefly disrupted and Ubiquiti enforces a cloud account to manage local device accounts. Customers are advised to change their product passwords as a precaution.<\/p>\n<p><!--more--><\/p>\n<h2>Who is Ubiquiti?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg06.met.vgwort.de\/na\/fc113fc4895441a7a4a8ad0f55918bc9\" width=\"1\" height=\"1\"><a href=\"https:\/\/de.wikipedia.org\/wiki\/Ubiquiti_Networks\" rel=\"noopener\" target=\"_blank\">Ubiquiti Networks<\/a> is an American manufacturer that has been selling active networking components such as WLAN adapters for PCs since its founding in 2005. In the meantime, the product range has been expanded to include WLAN routers, access points, WLAN antennas and directional antennas, especially for outdoor use. Since 2014, the manufacturer has also offered VoIP phones as well as switches and network cameras for professional and semi-professional use. Ubiquiti's WLAN routers are based on WLAN chips from Atheros and use a Linux-based operating system (\"airOS\"). The nanoStation routers are very popular, because they allow the use of custom firmware. Ubiquiti products can be found on sale at Amazon and many other electronics retailers. <\/p>\n<h2>Vendor informs customers about hack<\/h2>\n<p>Now Ubiquiti has been the victim of a cyberattack that may have also stolen customer data. Customers of the company have received an email informing them of the incident. I became aware of the matter via a <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1348731909401141248\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from Bleeping Computer. <\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1348731909401141248\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" title=\" Ubiquity victim of hacker attack\" alt=\" Ubiquity victim of hacker attack\" src=\"https:\/\/i.imgur.com\/dVREhwL.png\"><\/a><\/p>\n<p>After a bit of research, I came across <a href=\"https:\/\/community.ui.com\/questions\/Account-Notification\/96467115-49b5-4dd6-9517-f8cdbf6906f3\" target=\"_blank\" rel=\"noopener\">this announcement<\/a> from the manufacturer on the Ubiquiti forum, where they post some details.<\/p>\n<blockquote>\n<p><strong>Account Notification<\/strong><\/p>\n<p>We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider. We have no indication that there has been unauthorized activity with respect to any user's account.<\/p>\n<p>We are not currently aware of evidence of access to any databases that host user data, but we cannot be certain that user data has not been exposed. This data may include your name, email address, and the one-way encrypted password to your account (in technical terms, the passwords are hashed and salted). The data may also include your address and phone number if you have provided that to us.<\/p>\n<p>As a precaution, we encourage you to <a href=\"https:\/\/account.ui.com\/security\" rel=\"noopener\" target=\"_blank\">change your password<\/a>. We recommend that you also change your password on any website where you use the same user ID or password. Finally, we recommend that you enable two-factor authentication on your Ubiquiti accounts if you have not already done so.<\/p>\n<p>We apologize for, and deeply regret, any inconvenience this may cause you. We take the security of your information very seriously and appreciate your continued trust.<\/p>\n<p>Thank you,<\/p>\n<p>Ubiquiti Team<\/p>\n<\/blockquote>\n<p>Users are getting informed about an unauthorized access to the internal IT system via a cloud provider. Ubiquity says, there is no evidence of user accounts being accessed by users who use Ubiquiti products. However, the message advises users to change their password as a precaution and, if possible, to activate two-factor authentication. This probably refers first to the cloud account set up at this provider, but could also be interpreted to mean changing passwords for local accounts on devices. Due to the fact that the mail contains direct links to pages for changing the password, some users thought the message was a phishing attempt, as you can <a href=\"https:\/\/community.ui.com\/questions\/Account-Notification-email-from-Ubiquiti-Legit\/4832d5df-3abe-4fa4-8d8f-cfdb8fe21432#answer\/f0f22052-c7a2-46ba-9e6e-81eb62341c17\" target=\"_blank\" rel=\"noopener\">read here<\/a>.<\/p>\n<h2>Cloud account to manage local access<\/h2>\n<p>Bleeping Computer writes in <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1348733900017827841\" target=\"_blank\" rel=\"noopener\">a tweet<\/a> that there was an outage of cloud services at Ubiquiti over the weekend (January 10, 2021). The whole thing is up and running again, but is likely the reason for the current email warning.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1348733900017827841\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" title=\"Coud outage at Ubiquiti\" alt=\"Coud outage at Ubiquiti\" src=\"https:\/\/i.imgur.com\/EuEobib.png\"><\/a><\/p>\n<p>I don't own such products, but I am puzzled about the facts, that a cloud outage has influences to my local user account for a device. Then at Bleeping Computer, I read <a href=\"https:\/\/web.archive.org\/web\/20220626143507\/https:\/\/www.bleepingcomputer.com\/news\/security\/networking-giant-ubiquiti-alerts-customers-of-potential-data-breach\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>. In the spirit of 'everything in the cloud', Ubiquiti is tricking users within its setup wizzard to create a cloud account with this vendor in order to manage their local passwords (German readers told me, it's still possible to omit a cloud account and setup a device locally). In <a href=\"https:\/\/community.ui.com\/questions\/A-Request-for-Local-Accounts-in-light-of-this-breach-1-11-2021\/4972a1fb-ff95-4dc3-b920-63b3b292bf96\" target=\"_blank\" rel=\"noopener\">a forum entry<\/a>, frustrated users rants about this.<\/p>\n<p>So if anyone has routers, cameras, doorbells, switches or similar products from this vendor in use, they should change the passwords (of the cloud account and local devices, if applicable) as a precaution. Furthermore, I recommend thinking about whether a US manufacturer that (virtually) imposes password management for local access via its own cloud offering can be the right partner. The only reason for using certain products (wireless antennas) from this provider can at most be the possibility mentioned at the beginning to flash your own (nanoStation router) operating system onto the hardware there.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A note to users, the products of the US manufacturer Ubiquiti Networks. The latter has fallen victim to a cyberattack, although the scope is still unclear. Over the weekend, their cloud offering was briefly disrupted and Ubiquiti enforces a cloud &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/01\/12\/hersteller-ubiquiti-gehackt-nutzer-sollten-passwrter-ndern\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-18121","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/18121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=18121"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/18121\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=18121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=18121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=18121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}