

In a security alert published by Rapid7, senior security researcher Jon Hart explained that attackers are exploiting a "discovery service" running on port 10,001, which Ubiquiti Networks included in its devices so the company and internet service providers (ISPs) can use it to find Ubiquiti equipment on the internet and in closed networks. There haven't been any major outages caused by DDoS attacks carried out via this attack vector, industry insiders have told ZDNet. The exploitation attempts are in their incipient stages, and attackers are still experimenting with the best way to carry out the attacks. While some phishing attacks are designed to deliver malware, making an. Questions? Please have a look at our FAQ.Troutman said threat actors have been using a service running on port 10,001 on Ubiquiti devices to carry out weak DDoS amplification attacks.Īttackers are sending small packets of 56 bytes to port 10,001 on Ubiquiti devices, which are reflecting and relaying the packets to a target's IP address amplified to a size of 206 bytes (amplification factor of 3.67). In 2015, Ubiquiti Networks, a computer networking company based in the US. Please scroll down to see a list of our reports. This report has 4 indicators that were mapped to 6 attack techniques and 5.

Please note that on there was a change in some of the report formats (announcement here). Hybrid Analysis develops and licenses analysis tools to fight malware. Ubiquiti Device Discovery Tool Discover Ubiquiti devices on your local network. Free open-source tools, such as IntelMQ exist to help automate our feed parsing and handling. We recommend you also use our API to automate your process of report ingestion. If the Cloud Key firmware is not the latest version, click Upgrade Firmware to upgrade the firmware. Click Adopt in the Cloud Key’s Actions column to continue. Initially, it checks if there is a gateway available in each range and if such gateway is found the range is scanned again with higher. You can learn more on our reports in general in our Overview of Free Public Benefit Shadowserver Reports presentation, which also explains example Use Cases. The Ubiquiti Device Discovery Tool will search for the UniFi Cloud Key. The UISP Remote Discovery feature is running automatically in the background searching for all available devices within the IP ranges defined in the Settings > Network > Addresses > Monitored IP subnets section. Our data comes from daily scans, sinkholes, honeypot sensors, sandboxes, blocklists and many other sources.

To become better informed about the state of your networks and their security exposures (your attack surface), subscribe now. it can easily be deployed on remote systems). It is basically a re-implementation of the Java tool provided by Ubiquiti in Go as a terminal application (i.e. These reports are detailed, targeted, relevant, free and actionable. This is a standalone binary to detect Ubiquiti AirMax devices in your local network. Every day, Shadowserver sends custom remediation reports to more than 7000 vetted subscribers, including over 133 national governments (201 National CSIRTs) covering 175 countries and territories, as well as many Fortune 500 companies, ISPs, CSPs, banks, enterprises, universities, small business etc.
