They weren't necessarily backhauls... but a few firewall rules at the edge of the network and/or not running ancient firmware would have prevented it...
On Wed, Sep 7, 2016 at 6:57 PM, Chris Wright <ch...@velociter.net> wrote: > This sums up the kind of person who programs a public IP into their > backhauls. > > http://25.media.tumblr.com/tumblr_m8d8vusNcL1qa9jn1o2_500.gif > > Chris Wright > Network Administrator > Velociter Wireless > 209-838-1221 x115 > > > -----Original Message----- > From: Af [mailto:af-boun...@afmug.com] On Behalf Of Josh Reynolds > Sent: Wednesday, September 07, 2016 4:47 PM > To: af@afmug.com > Subject: Re: [AFMUG] Ubnt password hack with public IP radios > > Yep, it was widely talked about on the forum, the Brothers WISP podcast, > and through direct emails from UBNT to customers who have basically ever > sent them a working email address for anything.... > amongst other places. > > https://community.ubnt.com/t5/airMAX-Updates-Blog/Important- > Security-Notice-and-airOS-5-6-5-Release/ba-p/1565949 > > > On Wed, Sep 7, 2016 at 6:42 PM, Jaime Solorza <losguyswirel...@gmail.com> > wrote: > > Seems like a local WISP got radios hacked and passwords changed. > Someone > > told him there is a virus that sniffs Ubnt radios with public IPs and > > changes password to Moth3rfuck3r or something like that. Supposedly a > > telnet script can remedy this matter.... Anyone know about this? Tak > > > >