Sorry, here is the URL: http://www.securityweek.com/flaw-allows-hackers-find-ubiquiti-devices-exposed-web <http://www.securityweek.com/flaw-allows-hackers-find-ubiquiti-devices-exposed-web>
Sincerely, Joshaven Potter Google Hangouts: j...@g2wireless.co Cell & SMS: 1-517-607-9370 supp...@joshaven.com > On May 6, 2016, at 11:46 AM, That One Guy /sarcasm > <thatoneguyst...@gmail.com> wrote: > > whats the remote management thats enabled by default? or just the web > management? > > On Fri, May 6, 2016 at 10:41 AM, Joshaven Mailing Lists <lis...@joshaven.com > <mailto:lis...@joshaven.com>> wrote: > FYI… This is why you keep your firmware updated... :) > > <Flaw_Allows_Hackers_to_Find_Ubiquiti_Devices_Exposed_to_Web___SecurityWeek_Com.jpg> > > Sincerely, > Joshaven Potter > Google Hangouts: j...@g2wireless.co <mailto:j...@g2wireless.co> > Cell & SMS: 1-517-607-9370 <tel:1-517-607-9370> > supp...@joshaven.com <mailto:supp...@joshaven.com> > > >> On May 4, 2016, at 6:33 PM, Tushar Patel <tpa...@ecpi.com >> <mailto:tpa...@ecpi.com>> wrote: >> >> Radios could be put on private ip so nobody from outside world can access >> it. That is what we do. >> >> Tushar >> >> >> On May 4, 2016, at 5:22 PM, SmarterBroadband <li...@smarterbroadband.com >> <mailto:li...@smarterbroadband.com>> wrote: >> >>> I have received a number of emails for ab...@light-gap.net >>> <mailto:ab...@light-gap.net> saying certain of our IP address are being >>> used for attacks (see email text below). >>> >>> All IP addresses are in UBNT radios. We are unable to remote access any of >>> the these radios now. We see that the radio we are unable to access >>> rebooted a couple of days ago. A number of other radios show they rebooted >>> around the same time (in sequence) on the AP. We are unable to remote >>> access any of those either. Other radios with longer uptime on the AP’s are >>> fine. >>> >>> We have a tech on route to one of the customer sites. >>> >>> We think the radios are being made into bots. Anyone seen this or anything >>> like this? Do the hackers need a username and password to hack a radio? >>> I.E. Would a change of the password stop the changes being made to the >>> radios? Any other thoughts, suggestions or ideas? >>> >>> Thanks >>> >>> Adam >>> >>> Email Text below: >>> >>> “This is a semi-automated e-mail from the LG-Mailproxy authentication >>> system, all requests have been approved manually by the >>> system-administrators or are obviously unwanted (eg. requests to our >>> spamtraps). >>> For further questions or if additional information is needed please reply >>> to this email. >>> >>> The IP xxx.xxx.xxx.xxx has been banned for 48 hours due to suspicious >>> behaviour on our system. >>> This happened already 1 times. >>> It might be be part of a botnet, infected by a trojan/virus or running >>> brute-force attacks. >>> >>> Our affected destination servers: smtp.light-gap.net >>> <http://smtp.light-gap.net/>, imap.light-gap.net >>> <http://imap.light-gap.net/> >>> >>> Currently 7 failed/unauthorized logins attempts via SMTP/IMAP with 6 >>> different usernames and wrong password: >>> 2016-05-04T23:48:40+02:00 with username "downloads.openscience.or.at >>> <http://downloads.openscience.or.at/>" (spamtrap account) >>> 2016-05-04T22:47:19+02:00 with username "sp_woq" (spamtrap account) >>> 2016-05-04T14:55:11+02:00 with username "info" (spamtrap account) >>> 2016-05-03T21:24:22+02:00 with username "fips" (spamtrap account) >>> 2016-05-03T20:57:19+02:00 with username "downloads.openscience.or.at >>> <http://downloads.openscience.or.at/>" (spamtrap account) >>> 2016-05-03T10:13:59+02:00 with username "d10hw49WpH" (spamtrap account) >>> 2016-05-03T05:34:43+02:00 with username "12345678" (spamtrap account) >>> Ongoing failed/unauthorized logins attempts will be logged and sent to you >>> every 24h until the IP will be permanently banned from our systems after 72 >>> hours. >>> >>> The Light-Gap.net <http://light-gap.net/> Abuse Team.” > > > > > -- > If you only see yourself as part of the team but you don't see your team as > part of yourself you have already failed as part of the team.