Network Security

Old Juniper Routers Targeted By Chinese Hackers To Deploy Various Payloads

Flag of China

Half-a-dozen TinyShell-based custom backdoors and other malicious payloads have been spread by Chinese cyberespionage threat group UNC3886 through the exploitation of Juniper Networks MX routers that have reached end-of-life as part of an attack campaign discovered in the middle of last year, reports The Hacker News.

Google's Mandiant team reported that aside from delivering the appid to active backdoors, as well as the irad, lmpad, jdosd, and oemd passive backdoors that facilitate file downloads, process injections, or shell command execution, UNC3886 also targeted the outdated Juniper routers to deploy the Medusa and Reptile rootkits . They also targeted the PITHOOK and GHOSTTOWN tools to enable SSH credentials compromise and evade detection, respectively.

This news came after enterprise Juniper Networks routers were reported by Lumen Black Lotus Labs to have been subjected to intrusions spreading a cd00r backdoor variant as part of the J-magic attack campaign.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.