![chr0me text spammer chr0me text spammer](https://cdn.searchenginejournal.com/wp-content/uploads/2019/02/2019-02-07_1604.jpg)
28, other Ubiquiti employees spotted the unusual downloads, which had leveraged internal company credentials and a Surfshark VPN connection to hide the downloader’s true Internet address. Sharp’s indictment doesn’t specify how much data he allegedly downloaded, but it says some of the downloads took hours, and that he cloned approximately 155 Ubiquiti data repositories via multiple downloads over nearly two weeks.
![chr0me text spammer chr0me text spammer](https://i.pcmag.com/imagery/lineupitems/28024.fit_lim.size_1050x578.v1593441318.png)
#Chr0me text spammer download#
They allege that in late December 2020, Sharp applied for a job at another technology company, and then abused his privileged access to Ubiquiti’s systems at Amazon’s AWS cloud service and the company’s GitHub accounts to download large amounts of proprietary data. On Wednesday, a former Ubiquiti developer was arrested and charged with stealing data and trying to extort his employer while pretending to be a whistleblower.įederal prosecutors say Nickolas Sharp, a senior developer at Ubiquiti, actually caused the “breach” that forced Ubiquiti to disclose a cybersecurity incident in January. In March, a Ubiquiti employee warned that the company had drastically understated the scope of the incident, and that the third-party cloud provider claim was a fabrication. disclosed that a breach at a third party cloud provider had exposed customer account credentials. In January 2021, technology vendor Ubiquiti Inc.