Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » China Hacker Violation Juniper Network is a router with custom backdoors and rootkits
Identity

China Hacker Violation Juniper Network is a router with custom backdoors and rootkits

userBy userMarch 12, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 12, 2025Ravi LakshmananCyberspy/Vulnerability

Tracked as UNC3886, China and Nexus Cyberspy Group has been observed targeting Juniper network’s end-of-life MX routers as part of a campaign designed to deploy custom backdoors, highlighting its ability to focus on internal network infrastructure.

“Backdoor has a variety of custom features, including active and passive backdoor functions, and an embedded script that disables logging mechanisms on target devices,” Google-owned Mandiant said in a report shared with Hacker News.

Threat intelligence companies described development as an enemy commercial evolution. This historically exploited zero-day vulnerabilities in Fortinet, Ivanti, and VMware devices to compromise networks of interest and establish persistence for remote access.

First documented in September 2022, the hacking crew has been rated “very proficient” and can target edge devices and virtualization technologies with the ultimate goal of violating defense, technology and communications organizations in the US and Asia.

These attacks usually take advantage of the fact that these network perimeter devices do not have security surveillance and detection solutions, allowing them to operate uninterrupted and without attention.

Cybersecurity

“The compromise on routing devices is a recent trend in tactics of espionage adversaries, recognizing the ability to access critical routing infrastructures for long-term, high levels of access, and has the potential for more disruptive behavior in the future,” Mandiant said.

The latest activities discovered in mid-2024 include the use of implants based on Tinyshell, a C-based backdoor that was used in the past by various Chinese hacking groups such as Liminal Panda and Velvet Ali.

Mandiant has identified six different Tiny Shell-based backdoors, saying each has unique features.

The AppID that supports file upload/download, interactive shell, sock proxy, and configuration changes (command and control server, port number, network interface, etc.) is the same as the APPID, but uses a different set of hardcoded C2 server IRADs with passive backdoors that work from packages that access the packets of LIBPCAP-based packet sniffets running sniffets packets. Utilities and passive backdoors launch external scripts to perform process injection into legitimate JUNOS OS processes, stalling JDOSD, which stalls logs. This implements UDP backdoor using file transfer and remote shell function OEMD.

It is also worth noting that bypassing the verified Exec (Veriexec) protection of Junos OS, it takes steps to run malware. This prevents untrusted code from being executed. This is achieved by gaining privileged access to the router from the terminal server used to manage network devices using legitimate credentials.

It then uses advanced privileges to inject malicious payloads into the memory of the legitimate cat process, leading to the execution of LMPAD backdoors while Veriexec is enabled.

Cybersecurity

“The main purpose of this malware is to disable all possible logging before the operator connects to the router and performs practical activities, then restores the logs after the operator is disconnected,” Mandiant pointed out.

Other tools deployed by UNC3886 include rootkits such as reptiles and medusas. Pithook hijacks SSH authentication and captures SSH credentials. and ghost towns for anti-maintenance purposes.

We recommend that you upgrade your Juniper device to the latest images released by Juniper Network. This includes mitigation and updated signatures for the Juniper Malware Removal Tool (JMRT).

Development is just over a month after Lumen Black Lotus Labs revealed that the enterprise-grade Juniper Network router has become the target of custom backdoors as part of a campaign called J-Magic, which offers a known backdoor variant named the CD00R.

“The malware deployed on Juniper Networks’ Junos OS routers indicates that UNC3886 has advanced system in-depth knowledge of the internal system,” says Mandiant Researchers.

“In addition, UNC3886 continues to tamper with log and forensic artifacts and use passive backdoors to prioritize stealth in its operations, focusing on long-term sustainability, while minimizing the risk of detection.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCyrebro’s AI-Native MDR platform wins silver at the 2025 Globee Cybersecurity Awards
Next Article Up to 170,000 UK homes are set to be more energy efficient
user
  • Website

Related Posts

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

May 8, 2025

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Trending Posts

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

May 8, 2025

US-UK Trade Contract: How is Trump’s global tariff talks formed? | International Trade News

May 8, 2025

Bill Gates says he will hand out 99% of his wealth by 2045 | Charity News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.