This sums up the kind of person who programs a public IP into their backhauls.

http://25.media.tumblr.com/tumblr_m8d8vusNcL1qa9jn1o2_500.gif

Chris Wright
Network Administrator
Velociter Wireless
209-838-1221 x115


-----Original Message-----
From: Af [mailto:af-boun...@afmug.com] On Behalf Of Josh Reynolds
Sent: Wednesday, September 07, 2016 4:47 PM
To: af@afmug.com
Subject: Re: [AFMUG] Ubnt password hack with public IP radios

Yep, it was widely talked about on the forum, the Brothers WISP podcast, and 
through direct emails from UBNT to customers who have basically ever sent them 
a working email address for anything....
amongst other places.

https://community.ubnt.com/t5/airMAX-Updates-Blog/Important-Security-Notice-and-airOS-5-6-5-Release/ba-p/1565949


On Wed, Sep 7, 2016 at 6:42 PM, Jaime Solorza <losguyswirel...@gmail.com> wrote:
> Seems like a local WISP got radios hacked and passwords changed.    Someone
> told him there is a virus that sniffs Ubnt radios with public IPs and
> changes password to Moth3rfuck3r or something like that.   Supposedly a
> telnet script can remedy this matter.... Anyone know about this?   Tak



Reply via email to