As a former Ubiquiti employee, I'm sad to watch the slow decline of the company. There was a steady exodus of engineering talent through 2020. The CEO was focused on moving to countries where engineering was cheaper and employees complained less about constant crunch mode. If you search around, you can find interviews where he brags about closing the San Jose office because he thought everyone there was too entitled.<p>The saddest part is that we had many good engineers who could have continued to do amazing things with the UniFi momentum. So much time was wasted on dead end products like FrontRow. Most everyone I know left for jobs where we were treated better and paid more.
PSA: with Mailchimp URLs, it's best to remove the `?e=xxx` URL parameter. That way, A) you can't be identified by the sender as the person who shared the email, and B) other people can't flood your inbox by clicking the "unsubscribe" link at the bottom of the email.<p>In this case, the cleaned URL that should have been posted is <a href="https://mailchi.mp/ubnt/account-notification" rel="nofollow">https://mailchi.mp/ubnt/account-notification</a>
Regarding authenticity, from the TechCrunch article about this:<p>> The networking company quickly followed its email with a post on its community pages confirming that the email was authentic, after several complained that the email sent to customers included typos.<p>Indeed: How am I supposed to know whether this email is really from Ubiquiti?<p>* There was apparently no official press release.<p>* All links in the email, including the "Change password" button, are to e.g. `<a href="https://ui.us8.list-manage.com/track/click?u=somehexnumber&id=morehex&e=morehex" rel="nofollow">https://ui.us8.list-manage.com/track/click?u=somehexnumber&i...</a>`.<p>* The delivering server is `mail42.atl11.rsgsv.net`, which the TLD of which doesn't seem to resolve in my browser to provide hints.<p>* Various news sites that reported this either just referred to "emails people got", screenshots random people got via Twitter, or link to the Mailchimp site, for which I'm not sure how to verify whether the "ubnt" account actually belongs to Ubiquiti.<p>Given this, how shall the normal affected user figure out that this isn't well-executed phishing?<p>It seems companies could do a much better job making it obvious that their emails are legit. Especially if they were just breached, and "Change password" buttons are involved.
I must admit - Ubiquiti has lost some of it's shine in the last few years, whilst AP and routing hardware seems to still be very good in terms of pricepoint, it does feel like the software side of things has been going in a very strange direction for quite some time.<p>I'm still quite annoyed by the fact that I was forced to migrate from Unifi Video to Unifi Protect - due to vendor lock in and the fact that the remote interface for Unifi Video was switched off this month.<p>I guess on the plus side - no one who is still using Unifi Video has to worry all that much.....<p>Hopefully it is just a case of resetting passwords and enabling 2FA if you haven't done it already - not entirely sure how much damage could be done otherwise, unless there is an undocumented backdoor into Ubiquiti products ?
No specific comments to the breach... But, I couldn't help but chuckle at We Take Your Security Seriously™.<p>Why does every company, after demonstrating a lack of security, like to say this exact line? I can just imagine the PR person hovering over the shoulder of whoever authored the post yelling "make sure you tell the victims of this breach that we care!"
Ubiquiti has typically been the "cloudless" provider which is why I've used their stuff. They've been sorta moving in a disturbing direction for cloud control. I don't want that risk.
Argh, why do I learn about this from HN when they pretty much force me through the cloud login with UDM-Pro. Nothing in the dashboard. Also I think <a href="http://unifi/" rel="nofollow">http://unifi/</a> is crap from a security standpoint. Their threat management also seems to be just some kind of a bad joke.They could for example do a nice hardware based honeypot that you have to untrigger with physical access. They could offer so much more for prosumers providing sane defaults for a common case of having multitude of devices at your home which can be categorized as intruder but expect to be on the same network as your phone.<p>Is there a better alternative? When I tested multiple routers mostly regarding low latency, network stability and reliability a few years ago nothing came close, especially when having multiple access points.
Bit more from reddit ubiquiti forum. <a href="https://reddit.com/r/Ubiquiti/comments/kv9fc8/ubiquiti_email_re_breach/" rel="nofollow">https://reddit.com/r/Ubiquiti/comments/kv9fc8/ubiquiti_email...</a>
This is why cloud login for network devices is terrible. I use an EdgeRouter at home with no cloud connection and I'm quite happy with it, but I've used UniFi in another setting, and I am not thrilled at the ease of getting internal passwords and the like set on devices from any web browser, for instance.<p>Another company's network products I work with technically has a self-hosted version of their management service, but it doesn't scale down well (it expects dozens of GBs of RAM and to be running on SSD storage or it's not supported). I've regularly felt pressured to move to the cloud just to avoid the jankiness.
As someone who was planning on buying Ubiquiti hardware for their house, this breach and a lot of the comments here are disconcerting. Are there any other alternatives that are more locally managed that people would recommend?
I followed the instructions in their email: 1. change password, and 2. enable 2FA (confirm enabled in my case).<p>Password change went fine. I expected existing sessions to my controller login would be terminated upon a password change. I suppose that's not mandatory but it sure wouldn't be surprising behaviour for security software IMO. It's the conservative thing to do, no?<p>Nope. Already logged-in sessions (web and iOS app) remained functional when I changed the underlying password. No need to re-authenticate.<p>Before I received their breach email today, the past two days I have been unable to log into my controller at all. This was being reported by others through unofficial channels at the same time (Twitter, Reddit). Ubiquiti was silent until this morning. Maybe it's just a bad coincidence.<p>I'm a new Ubiquiti customer. My gear is < 30 days old. Their UniFi Dream Machine seemed to be my "dream" for a home network (AP, VPN, notifications, guests, pretty dashboard). It's probably better than the alternatives. But I'm forming a less than stellar first impression of them after this. Honeymoon over.
Must admit to being disappointed with recent Ubiquiti developments. The requirement to 'Sync Local Admin with Ubiquiti SSO' for controller authentication is not great.<p>At least as far as I can tell, this means your local controller account requires an internet connection to reach your UI.com account, so there is no local isolation of administrative accounts anymore.
I did a double take after clicking through- when did Unifi change their URL to UI.com? I thought this was a clever scaled phishing attempt for a second.<p>Come to think of it, how many times have they changed their URL/how many are there? feels like im being trained to do something stupid.
More discussions on Ubiquiti subreddit:<p><a href="https://www.reddit.com/r/Ubiquiti/comments/kv9fc8/ubiquiti_email_re_breach/" rel="nofollow">https://www.reddit.com/r/Ubiquiti/comments/kv9fc8/ubiquiti_e...</a>
"We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider."<p>Is this an attempt to shift blame? Using wording that implies it was someone else's fault is not confidence inspiring.
Ubiquiti is in a weird market, where they are better than Linksys/Netgear etc, but they are crap compared to something like Meraki.<p>Their support isn't very good (they point you to a forum), their hardware replacement is spotty (sorry, out of stock, you'll have to wait!), and their hardware/software is buggy. We had 48 port switches that would randomly reboot, for example.<p>They can be a decent solution for SMB wifi, but that's as far as I would go. Nothing mission-critical unless you are willing to make compromises you wouldn't have to with a bigger vendor.
I use the LinuxServer.io Unify controller docker container, it updates very often and everytime it asks me if I want to share data. It feels so dirty, my lan traffic is so personal and I meant to upgrade security and privacy by switching away from my ISP provided modem/wifi. I'm beginning to regret this decision and maybe should have chosen another solution.
Does anyone know how to completely delete the Ubiquity account? I can't find an option anywhere on the website.<p>For now I've renamed the username and put in a fake email address (sadly the username `deletemyaccount` was taken).
Did they email everyone with an account this information? I.e., if I didn't get that email, I don't have an account?<p>You can't check via a login page whether you have an account...
That link looks awful on a mobile browser. Isn't MailChimp supposed to make responsive emails easy.<p>It's so bad, they have disabled pinch to zoom, so I just horizontally scroll.
ooooh, turn off "Remote Management" if you use Unifi products and are concerned<p><a href="https://help.ui.com/hc/en-us/articles/115012240067-UniFi-How-to-Enable-Remote-Access-for-Remote-Management" rel="nofollow">https://help.ui.com/hc/en-us/articles/115012240067-UniFi-How...</a>
It's particularly annoying that these happen but UBNT won't let you delete your account without calling their help desk (?!) [1] or dropping some sort of GDPR bomb on their heads.<p>1: <a href="https://community.ui.com/questions/How-do-I-get-my-account-and-profile-deleted-and-removed-due-to-the-security-breach/02dcbf9c-6f1c-4688-987f-496e944c3a61#answer/cb83695e-c848-4652-a5ab-02b481fada63" rel="nofollow">https://community.ui.com/questions/How-do-I-get-my-account-a...</a>
This is a terrible public notification. What is the scope of the breach? Their forum software? The accounts Unifi customers can use for cloud-based admin of their private networks? Support tickets?<p>It doesn't inspire one iota of confidence. Quite the opposite.