Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Berliners swim in the Spree River to protest 100-year ban

June 17, 2025

Juneteenth highlights tribal slavery descendants’ citizenship struggle

June 17, 2025

Weeds can give us clues about the lawn

June 17, 2025
Facebook X (Twitter) Instagram
Trending
  • Berliners swim in the Spree River to protest 100-year ban
  • Juneteenth highlights tribal slavery descendants’ citizenship struggle
  • Weeds can give us clues about the lawn
  • Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know
  • How the humble water gun became the symbol of Barcelona’s anti-tourism movement
  • Recipe for Nigerian-inspired fried rice is easy for a weeknight
  • Amusement parks face tariffs and economic uncertainty
  • Appalachian Trail thru-hikers take on half-gallon ice cream eating challenge
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Tuesday, June 17
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers
Cybersecurity

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

adminBy adminMarch 12, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 42


Security researchers at Mandiant have discovered a series of custom backdoors deployed on end-of-life Juniper Networks Junos OS routers by a Chinese cyberespionage group that has historically targeted network devices.

According to Mandiant documentation, the backdoors were planted on end‑of‑life hardware and software and included bypasses for Junos OS’s veriexec subsystem, a kernel‑based file integrity protection mechanism.

Technical analysis shows that the attackers gained privileged access through legitimate credentials, entering the FreeBSD shell via the Junos OS CLI. Once inside, they employed process injection techniques to avoid triggering veriexec alerts. 

“The backdoors had varying custom capabilities, including active and passive backdoor functions, as well as an embedded script that disables logging mechanisms on the target device,” Mandiant warned.

The hacking operation, tagged as UNC3886, is described as a China-nexus hacking operation that has historically targeted network devices and virtualization technologies with zero-day exploits. 

The APT’s interests seem to be focused mainly on defense, technology, and telecommunication organizations located in the US and Asia, Mandiant said.

Mandiant researchers explained that the China-nexus group used a “here document” to generate a base64‑encoded file that was decoded into a compressed archive containing malicious payloads. 

After analyzing memory from compromised routers, Mandiant discovered that the  attackers injected payloads into a spawned process.  The company identified six modified TINYSHELL‑based malware samples, each with unique activation methods and capabilities tailored to Junos OS, highlighting the hacking team’s detailed understanding of the system internals.

Advertisement. Scroll to continue reading.

Mandiant said it observed the hackers targeting network authentication services, including the Terminal Access Controller Access-Control System (TACACS+), and terminal servers with access to the routers to gain privileged initial access.

“This privileged access allowed the threat actor to enter Junos OS shell mode and perform restricted operations. Investigating further actions taken by the threat actor was hampered by the challenges inherent in analyzing proprietary network devices, which required novel methods for artifact acquisition and analysis.”

The company released IOCs and YARA rules to help defender hunt for signs of infections. Mandiant is also recommending that organizations upgrade their Juniper devices to the latest images released by Juniper Networks, which includes mitigations and updated signatures for the Juniper Malware Removal Tool (JMRT). 

“Organizations should run the JMRT Quick Scan and Integrity Check after the upgrade,” Mandiant said.

Related: Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS

Related: VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products

Related: Juniper Warns of Mirai Botnet Targeting Session Smart Routers

Related: China’s Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know

June 16, 2025

Topline President Donald Trump earned $57.4 million from World Liberty Financial, a crypto company he…

Private Equity’s First Woman Billionaire Owns San Diego Soccer Team

June 11, 2025

Billionaire Walmart Heiress Urges People To ‘Mobilize’ At June 14 Anti-Trump Protests

June 11, 2025

Anduril Cofounder Trae Stephens Is Now A Billionaire

June 10, 2025
Our Picks

Berliners swim in the Spree River to protest 100-year ban

June 17, 2025

Juneteenth highlights tribal slavery descendants’ citizenship struggle

June 17, 2025

Weeds can give us clues about the lawn

June 17, 2025

Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know

June 16, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.