Ubiquiti
| Formerly | Ubiquiti Networks, Inc. |
|---|---|
| Company type | Public |
| |
| Industry | Computer networking, energy |
| Founded | October 2003[1] in San Jose, California, United States |
| Founders | Robert Pera |
| Headquarters | , US |
| Products | Computer networking devices |
| Revenue | US$2.57 billion (2025)[2] |
| US$836 million (2025)[2] | |
| US$712 million (2025)[2] | |
| Total assets | US$1.47 billion (2025)[2] |
| Total equity | US$668 million (2025)[2] |
Number of employees | 1,667 (2025)[2] |
| Website | www |
Ubiquiti Inc. (formerly Ubiquiti Networks, Inc.)[3] is an American technology company founded in San Jose, California, in 2003.[1][4] Now based in New York City,[5] Ubiquiti manufactures and sells wireless data communication and wired products for enterprises and homes under multiple brand names. On October 13, 2011, Ubiquiti had its initial public offering (IPO) at 7.04 million shares, at $15 per share,[6] raising $30.5 million.[7]
Products
Ubiquiti's first product line was its "Super Range" mini-PCI radio card series, which was followed by other wireless products.
The company's Xtreme Range (XR) cards operated on non-standard IEEE 802.11 bands, which reduced the impact of congestion in the 2.4 GHz and 5.8 GHz bands. In August 2007 a group of Italian amateur radio operators set a distance world record for point-to-point links in the 5.8 GHz spectrum. Using two XR5 cards and a pair of 35 dBi dish antennas, the Italian team was able to establish a 304 km (about 188 mi) link at data rates between 4 and 5 Mbit/s.[8]
The company (under its "Ubiquiti Labs" brand) also manufactures a home-oriented wireless mesh network router and access point combination device, as a consumer-level product called AmpliFi.[9]
Brands
Ubiquiti product lines include UniFi, AmpliFi, EdgeMax, UISP, airMAX, airFiber, GigaBeam, and UFiber.
Their most well known product line is UniFi which is focused on home, prosumer, business wired and wireless networking in addition to IP cameras, physical access control systems, and VoIP phones. The EdgeMax product line is dedicated to wired networking, containing only routers and switches. UISP, announced in 2020, is a range of products for internet service providers.[10]
airMAX is a product line dedicated to creating point-to-point (PtP) and point-to-multi-point (PtMP) links between networks. airFiber and UFiber are used by wireless and fiber Internet service providers (ISP) respectively.
Software products
Ubiquiti develops a variety of software controllers for their various products including access points, routers, switches, cameras, and locks. These controllers manage all connected devices and provide a single point for configuration and administration. The software is included as part of UniFi OS, an operating system that runs on devices called UniFi OS Consoles (UniFi Dream Machine, Dream Wall, Dream Router, Cloud Key).
The UniFi Network controller can alternatively be installed on Linux, FreeBSD, macOS, or Windows, while the other applications included with UniFi OS such as UniFi Protect and UniFi Access must be installed on a UniFi OS Console device.
WiFiman is an internet speed test and network analyzer tool that is integrated into most Ubiquiti products. It has mobile apps and a web version.
Security issues
U-Boot configuration extraction
In 2013, a security issue was discovered in the version of the U-Boot boot loader shipped on Ubiquiti's devices. It was possible to extract the plaintext configuration from the device without leaving a trace using Trivial File Transfer Protocol (TFTP) and an Ethernet cable, revealing information such as passwords.[11]
While the issue is fixed in current versions of Ubiquiti hardware, despite many requests and acknowledgment that they are using GPL-protected application, Ubiquiti refused to provide the source code for the GNU General Public License (GPL)-licensed U-Boot.[12][13] This made it impractical for Ubiquiti's customers to fix the issue.[12] The GPL-licensed code was released eventually.[14]
Upatre Trojan
It was reported by online reporter Brian Krebs, on June 15, 2015, that "Recently, researchers at the Fujitsu Security Operations Center in Warrington, UK began tracking [the] Upatre [trojan software] being served from hundreds of compromised home routers – particularly routers powered by MikroTik and Ubiquiti's airOS".
Bryan Campbell of the Fujitsu Security Operations Center in Warrington, UK was reported as saying: "We have seen literally hundreds of wireless access points and routers connected in relation to this botnet, usually AirOS ... The consistency in which the botnet is communicating with compromised routers in relation to both distribution and communication leads us to believe known vulnerabilities are being exploited in the firmware which allows this to occur."[15]
2021 alleged data breach and lawsuit
In January 2021, a potential data breach of cloud accounts was reported,[16] with customer credentials having potentially been exposed to an unauthorized third party.
In March 2021 security blogger Brian Krebs reported that a whistleblower disclosed that Ubiquiti's January statement downplayed the extent of the data breach in an effort to protect the company's stock price. Furthermore, the whistleblower claimed that the company's response to the breach put the security of its customers at risk.[17] Ubiquiti responded to Krebs's reporting in a blog post, stating that the attacker "never claimed to have accessed any customer information" and "unsuccessfully attempted to extort the company by threatening to release stolen source code and specific IT credentials." Ubiquiti further wrote that they "believe that customer data was not the target of, or otherwise accessed in connection with, the incident."[18]
On December 1, 2021, the United States Attorney for the Southern District of New York charged a former high-level employee of Ubiquiti for data theft and wire fraud, alleging that the "data breach" was in fact an inside job aimed at extorting the company for millions of dollars. The indictment also claimed that the employee caused further damage "by causing the publication of misleading news articles about the company’s handling of the breach that he perpetrated, which were followed by a significant drop in the company’s share price associated with the loss of billions of dollars in its market capitalization." The Verge reported that the indictment shed new light on the supposed breach and appeared to back up Ubiquiti's statement that no customer data was compromised.[19][20]
In March 2022, Ubiquiti filed a lawsuit[21] against Brian Krebs, alleging defamation for his reporting on their security issues. Both parties resolved their dispute outside the court in September 2022.
Other
In 2015, Ubiquiti revealed that it lost $46.7 million when its finance department was tricked into sending money to someone posing as an employee.[22]
Legal difficulties
United States sanctions against Iran
In March 2014, Ubiquiti agreed to pay $504,225 to the Office of Foreign Assets Control after it allegedly violated U.S. sanctions against Iran.[23]
Open-source licensing compliance
In 2015, Ubiquiti was accused of violating the terms of the GNU General Public License (GPL) for open-source code used in their products.[13] The original source of the complaint updated their website on May 24, 2017, when the issue was resolved.[14] In 2019, Ubiquiti was reported as again being in violation of the GPL.[24]
Russo-Ukrainian War
In January 2024, the United States Department of Justice blocked an exploit that Russian Military Unit 26165 had been using on compromised Ubiquiti Edge OS routers as part of a cyber campaign against the United States and its allies, including Ukraine.[25][26]
In July 2025, Zvezda published videos from the Russian Ministry of Defense of the 25th Combined Arms Army troops installing UISP Litebeam 5AC wireless communication systems. The Russian Ministry of Defence stated the wireless technologies significantly increased the efficiency of unit management in the Russo-Ukrainian war (2022–present).[27]
In October 2025, Russia-1 shared footage of troops of the 36th Guards Combined Arms Army unboxing a Ubiquiti Litebeam, and climbing a telecommunications pole with a Ubiquiti product in Donetsk People's Republic.[28][29]
Another October 2025 article from TASS, reported 200 signal troops were involved in communication exercises in the Saint Petersburg region. A signalman can be seen logging into and using Ubiquiti's airOS operating system.[30]
On January 27, 2026, Hunterbrook, a short seller of Ubiquiti stock, published an article outlining Russia's allegedly large-scale deployment of Ubiquiti products to the frontlines of the Russo-Ukrainian war.[31][32] Hunterbrook alleges that Ubiquiti violates sanction law by not taking action to disrupt the distribution of its products to the Russian Armed Forces.
In February 2026, the Ukrainian 68th Jaeger Brigade shared footage of Ubiquiti antennaes being used by the Russian army in the Pokrovsk direction.[33]
References
- ^ a b "Company". Ubiquiti Inc. Retrieved June 8, 2021.
- ^ a b c d e f "Ubiquiti Networks FY 2025 Annual Report (Form 10-K)". U.S. Securities and Exchange Commission. August 22, 2025.
- ^ "UBIQUITI NETWORKS REPORTS FOURTH QUARTER FISCAL 2019 FINANCIAL RESULTS" (PDF). August 9, 2019. Archived (PDF) from the original on December 31, 2019. Retrieved April 2, 2022.
At the close of business on August 19, 2019, the company will legally change its name to Ubiquiti Inc. The last trading day on NASDAQ under the name Ubiquiti Networks, Inc. and the UBNT symbol is expected to be August 19, 2019.
- ^ Greenberg, Herb (June 12, 2012). "Yet Another Controversy for Ubiquiti?". CNBC. Retrieved June 8, 2021.
- ^ Witkowski, Wallace (September 18, 2017). "Ubiquiti shares hammered by Citron 'fraud' claim that contains little new evidence - MarketWatch". MarketWatch.com. Retrieved November 29, 2017.
That may be a factor that led Ubiquiti's auditor, PWC, to cite a lack of internal controls in 2015, and an eventual staff clear-out that led Ubiquiti to move its headquarters from San Jose, Calif., to New York City and change auditors to KPMG.
- ^ Tillman, Trent (October 13, 2011). "Ubiquiti Networks IPO Priced To Work At $15?". Seeking Alpha. Retrieved December 22, 2012.
- ^ "Annual report for fiscal year ended June 30, 2012". Form 10-K. US Securities and Exchange Commission. September 21, 2012. Retrieved October 16, 2013.
- ^ "World Record 304km Wi-Fi connection". newatlas.com. August 27, 2007. Retrieved December 22, 2012.
- ^ "Hands-on: Ubiquiti's Amplifi covers the whole house in a Wi-Fi mesh". Ars Technica. July 20, 2016. Retrieved December 1, 2016.
- ^ "Ubiquiti: UISP Is The New UNMS". McCann Tech. December 29, 2020. Retrieved January 24, 2021.
- ^ "Re: AirOS and Security: DUMP of configuration files with TFTP or other thing". community.ui.com. July 16, 2014. Retrieved May 9, 2017.
- ^ a b "GPL archive missing components". community.ubnt.com. March 2, 2013. Archived from the original on December 9, 2016. Retrieved May 9, 2017.
- ^ a b Riley Baird (April 7, 2015). "How Ubiquiti Networks Is Creatively Violating the GPL". LibertyBSD. Archived from the original on April 30, 2017. Retrieved April 30, 2017.
- ^ a b Riley Baird (May 24, 2017). "N/A". LibertyBSD. Archived from the original on May 24, 2017. Retrieved December 12, 2017.
- ^ "Crooks Use Hacked Routers to Aid Cyberheists". Krebs on Security. June 29, 2015.
- ^ "Ubiquiti says customer data may have been accessed in data breach". TechCrunch. January 11, 2021. Retrieved January 19, 2021.
- ^ Whistleblower: Ubiquiti Breach "Catastrophic", Krebs On Security, March 30, 2021
- ^ "Update to January 2021 Account Notification". Ubiquiti, Inc. March 31, 2021. Retrieved June 8, 2021.
- ^ "Former Employee Of Technology Company Charged With Stealing Confidential Data And Extorting Company For Ransom While Posing As Anonymous Attacker". www.justice.gov. December 1, 2021. Retrieved December 3, 2021.
- ^ Clark, Mitchell (December 1, 2021). "Ubiquiti hack may have been an inside job, federal charges suggest". The Verge. Retrieved December 3, 2021.
- ^ "Docket for UBIQUITI INC. v. KREBS, 1:22-cv-00352 - CourtListener.com". CourtListener. Retrieved March 30, 2022.
- ^ "Fraudsters duped this company into handing over $40 million". Fortune.com. August 10, 2015. Retrieved October 19, 2015.
- ^ "Ubiquiti Networks settles with OFAC for alleged violations of Iran sanctions", Debevoise & Plimpton LLP, March 7, 2014.
- ^ Denver Gingerich (October 2, 2019). "When companies use the GPL against each other, our community loses". SFconservancy. Retrieved December 21, 2020.
- ^ Purdy, Kevin (February 28, 2024). "DOJ turns tables on Russian hackers, uses their malware to wipe out botnet". Ars Technica. Retrieved February 23, 2026.
- ^ "Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation's Main Intelligence Directorate of the General Staff (GRU)". U.S. Department of Justice. February 15, 2024. Retrieved February 23, 2026.
- ^ "Связисты установили радиомосты между подразделениями в зоне СВО" [Signalmen established radio bridges between units in the SVO zone]. Zvezda (in Russian). Ministry of Defence of the Russian Federation. July 3, 2025. Retrieved February 23, 2026.
- ^ "Вести. Эфир от 20.10.2025 (09:00)" [Vesti. Broadcast from 20 October 2025 (09:00)]. Smotrim.ru (in Russian). VGTRK. October 20, 2025. Retrieved February 16, 2026.
- ^ "U.S. tech company Ubiquiti is supplying Russia's army with networking equipment by skirting sanctions, Hunterbrook investigation finds". The Insider. February 20, 2026. Retrieved February 23, 2026.
- ^ "В Ленинградской области к учениям привлекли более 200 связистов" [More than 200 signal troops involved in exercises in Leningrad Region]. ТАSS (in Russian). October 20, 2025. Retrieved February 15, 2026.
- ^ Lawler, Richard (January 27, 2026). "Report claims Ubiquiti's gear serves "a critical communications need of the Russian military, including in drone operations."". The Verge. Archived from the original on January 28, 2026. Retrieved February 2, 2026.
- ^ Ahn, Jenny (January 27, 2026). "Ubiquiti: The U.S. Tech Enabling Russia's Drone War". Hunterbrook. Retrieved January 27, 2026.
- ^ Епуряну, Вячеслав (February 23, 2026). "Спутник и разгром: как блокировка российских Starlink перевернула ситуацию на фронте" [Sputnik and Defeat: How the Blocking of Russian Starlink Changed the Situation on the Front]. The Insider (in Russian). The Insider. Retrieved February 23, 2026.