Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Crime The Almighty Buck

Tech Firm Ubiquiti Suffers $46M Cyberheist 54

An anonymous reader writes: Brian Krebs reports that Ubiquiti Networks, known for their wireless networking hardware, has lost $46.7 million to a scam in which thieves were able to impersonate employees and initiate fraudulent wire transfers. Ubiquiti was able to recover only $8.1 million of the amounts transferred, and an additional $6.8 million is subject to legal injunction. Krebs explains, "Known variously as 'CEO fraud,' and the 'business email compromise,' the swindle that hit Ubiquiti is a sophisticated and increasingly common one targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. ... CEO fraud usually begins with the thieves either phishing an executive and gaining access to that individual’s inbox, or emailing employees from a look-alike domain name that is one or two letters off from the target company’s true domain name." The theft was disclosed in Ubiquiti's quarterly financial report.
This discussion has been archived. No new comments can be posted.

Tech Firm Ubiquiti Suffers $46M Cyberheist

Comments Filter:
  • I understand why you want your customers clicking links from email because you can drive sales campaigns that way and get them coming back to your website. Besides, you can't really orchestrate a campaign to the public not to click on links from email. But I think internally companies can demand their employees to not click on links from email.
    • by TWX ( 665546 ) on Sunday August 09, 2015 @12:17PM (#50279963)
      Or, companies should institute a policy of calling the business with whom they're conducting business through a known-reliable means (like a telephone call) to speak with company officials that they're actually acquainted with, and to contact the financial institutions with whom they're coordinating such funds transfers, to confirm that all of the Is are dotted and Ts are crossed...

      There's a reason why they say that if you need to contact your bank, you should call the telephone number on the back of card, and reject any attempts by an entity claiming to be your bank that contacts you out of the blue, unless that caller literally asks you to contact the bank via the contact information that you already have on-file.

      Scams like this require the mark to be complacent. With this level of finances that's completely inexcusable.
      • With this level of finances that's completely inexcusable.

        With this level of finances the temptations are overwhelming. Any mark that doesn't demand a cut is an idiot.

      • It really makes you wonder how anyone this dumb gets to become CEO of anything that important.

        Even so, rule number one of finances: The CEO doesn't handle them.

        I get that they'd just lost their financial officers; in that case, you find temporary ones, from within the company if necessary, who nonetheless are not the CEO.

        (If you've got a small business, let's face it, you don't have a CEO. You don't have that much hierarchy. So for very small businesses where one person wears many hats, OK. But usually that

        • by ScentCone ( 795499 ) on Sunday August 09, 2015 @01:14PM (#50280233)
          You're confused. Just because someone in IT journalism calls it the "CEO scam" doesn't mean it's the CEO who falls for the phishing scheme that compromises their email account. It could be someone in the A/P side of procurement, it could be someone in the CTO's office, or the company's comptroller. If you think those people aren't all highly motivated to be cautious, you've never worked with any of them. Especially not those who work for publicly traded (and highly scrutinized) companies. You're pointing out that the CEO doesn't handle financial transactions and then wondering how someone "that dumb" gets the job. Well which is it?
          • You're confused. Just because someone in IT journalism calls it the "CEO scam" doesn't mean it's the CEO who falls for the phishing scheme that compromises their email account. It could be someone in the A/P side of procurement, it could be someone in the CTO's office, or the company's comptroller.

            Right. None of those people should have access to make any major transfers of funds. Anything more than a million or so should have to go through the CTO. If you're doing many billions of dollars in business, maybe more than a few million.

            • The problem is that the workflow, once you've got access to high enough level mailboxes, can be corrupted. Payment approval might be done via a two-part process in the ERP and an accompanying email, for example. Good enough social hacking, and that's that.
          • Nobody in AP should be making any payment unless there's an invoice to pay it against. There shouldn't be an invoice unless there's a supplier/vendor master record. There should be a PO too.

            You don't normally allow anyone to create more than one item in the chain. Certainly not all of them.

            Of course, if some C level twerp has a habit of pulling rank to do an end-run around established best practices because agile or something then all bets are off.

            • Once you've got key email accounts compromised, that can mean access to the ERP. Prepping the procurement chain, or faking up a contract reference becomes fairly straightforward at that point.
      • Comment removed based on user account deletion
      • by Anonymous Coward

        There's a reason why they say that if you need to contact your bank, you should call the telephone number on the back of card, and reject any attempts by an entity claiming to be your bank that contacts you out of the blue, unless that caller literally asks you to contact the bank via the contact information that you already have on-file.

        I've had many messages on my answering machines over the years that say things like, "This is [so-and-so] from [bank]. There is a problem with your account. Please call us at [phone number] right away." And that phone number is NOT the one on the back of my card, or on my monthly statement.

        So I always called the number on the card and eventually got transferred to someone who said, yes, there is a problem with your account, that was us calling you.

        Facepalm!

      • by kmoser ( 1469707 )
        And what happens when your outgoing phone calls get rerouted by a hacker?
    • And who will enforce that demand? The idiot CEO who's falling for the scam in the first place?

    • But I think internally companies can demand their employees to not click on links from email.

      They can demand anything they want, but will the employees listen? Noooooooooooooo.

  • by grc ( 52842 )

    Their products are actually very good. This seems to be a case of social engineering, not a technical security breach. Social Enginering is very hard to defend against, since humans are involved. Both high ranking and minimum wage types can be too trusting and / or gullible.

    • by Anonymous Coward

      I keep idiot-proofing everything and the damn liars just keep on building better idiots!

  • by xmas2003 ( 739875 ) * on Sunday August 09, 2015 @12:26PM (#50280009) Homepage
    Here's the SEC Filing [sec.gov] that got the ball rolling on this unfortunate situation.
    There's also some info in the WSJ writeup. [wsj.com]

    Their CFO had left in April and their Chief Accounting Officer just resigned ... unknown how those relate to what happened.

    Bummer to see this happen to Ubiquiti as they seem like a good company.
    • Given the way they treated me when my AP broke, I shed no tears for them. I recycled the cheap frisbee and bought an ASUS.
  • If employees are initiating wire transfers on the basis of simple emails - the problem is less one of them being scammed than it is lack of basic accounting controls. It's a large scale version of the "toner cartridge" scam, and works on the same principle.

    "Trust, but verify [the paperwork]" should be the order of the day. Preventing (or at least raising the difficulty of) this kind of scam is why purchase orders, invoices, etc... were invented in the first place.

  • I wish I was wealthy enough to be defrauded of 46 million dollars...
    • I wish I was wealthy enough to be defrauded of 46 million dollars...

      There's no body who was that wealthy and defrauded. That was some of the operating cash of a fairly good sized publicly traded company funded by lots of investors - you might even be one of them if you own some mutual funds.

  • Look no further (Score:5, Informative)

    by Rumagent ( 86695 ) on Sunday August 09, 2015 @12:59PM (#50280145)

    Look no further than the sorry state of email today. This problem was fixed 25 years ago:

      https://en.wikipedia.org/wiki/Pretty_Good_Privacy#Digital_signatures [wikipedia.org]

    One is almost tempted to think that someone is trying to keep private communications open and accessible...

    • That was a good start. Colin Robbins and some others had nice write-ups about why it wasn't enough. NSA, etc had nothing to do with it far as I can tell. Essentially, it was a combination of usability, compatibility with commercial clients, and the fact that you run into infrastructure issues the second you operate outside a small, closed group. Plus, you need protection against incoming emails and attachments. So, their solution which is worth FOSS knocking off was (a) a proxy on client that seemlessly doe

  • These attacks would be stopped by a combination of strong endpoint security, a guard protecting transfers, and mail guard + secure comms scheme so people know who's talking to who. These are all fielded as early as the 80's for military and some commercial use. Nexor is an example of a company selling the communications part. Argus, Tresys, Sirrix, LynxSecure, Dell Secure Consolidated Client, QubesOS... all examples of separating internal from risky stuff. Physical air gaps, KVM switches, separate network

    • by nnull ( 1148259 )
      Have you ever tried convincing these people to do this? Because I haven't had much luck. Most will look at you as some sort of crazy fool that wants to spend more money.
      • Yeah. It's why I wrote the second paragraph. Takeup was too minimal to stay in high assurance. I post solutions for free online to encourage takeup. But the methods are there and there's a niche market served by companies like Argus Systems and INTEGRITY Global Security.
  • by nuckfuts ( 690967 ) on Sunday August 09, 2015 @03:08PM (#50280781)

    Something I always wonder when fraud occurs involving bank transfers - why can't the money be traced? The whole system works on computers, which are inherently good at keeping records. Even if multiple hops are involved, I see only one reason why law enforcement agencies should not be able to trace funds to their destination - the unwillingness of banks to cooperate.

    There needs to be an international banking agreement that facilitates tracking. If some shady offshore bank refuses to sign on with the agreement, participating banks should refuse to transfer money to them.

    The fact that such an agreement is not already in place points to the corruptness of our finanacial institutions. There is simply no motivation to impede movement of funds by criminals.

  • ... Its a great company. I love their stuff.

Fast, cheap, good: pick two.

Working...