Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCII/OTChinese-Supported Hackers Infiltrate US Carrier-Grade Juniper MX Routers

Chinese-Supported Hackers Infiltrate US Carrier-Grade Juniper MX Routers

Published on

spot_img

In a recent discovery made by Mandiant researchers, it has been revealed that the routers of various organizations, believed to be telecommunications companies and internet service providers, were compromised by a sophisticated hacking group known as UNC3886. This malicious group was able to infiltrate the routers and implant a custom backdoor, which has been dubbed “TinyShell.”

The presence of TinyShell on these compromised routers is particularly concerning as it allows the hackers to maintain unauthorized access to the networks. This type of backdoor can be used to intercept sensitive data, tamper with network settings, and carry out other malicious activities without the knowledge of the organizations that own the routers.

Mandiant researchers have not disclosed the names of the organizations that were affected by this cyber attack, but it is clear that the potential impact could be significant. Telcos and ISPs play a crucial role in providing internet and communication services to millions of users, and a breach of their routers could have far-reaching consequences.

The discovery of TinyShell highlights the need for organizations to remain vigilant against cyber threats and actively monitor their networks for any signs of unauthorized access. It also underscores the importance of regularly updating and patching routers and other network infrastructure to prevent potential vulnerabilities from being exploited by malicious actors.

The fact that UNC3886 was able to successfully breach the routers of these organizations is a stark reminder of the evolving nature of cyber threats. Hackers are constantly developing new techniques and tools to bypass security measures and gain access to sensitive information. This incident serves as a wake-up call for companies to invest in robust cybersecurity measures and ensure that their networks are adequately protected against potential attacks.

Mandiant researchers are continuing to investigate the extent of the breach and are working with the affected organizations to mitigate the damage caused by UNC3886. It is crucial that these companies take immediate action to remove the TinyShell backdoor from their routers and strengthen their security protocols to prevent similar attacks in the future.

In today’s interconnected world, where businesses rely heavily on digital infrastructure to carry out their operations, the threat of cyber attacks is ever-present. The discovery of TinyShell on compromised routers serves as a stark reminder of the need for organizations to remain vigilant and proactive in safeguarding their networks against malicious actors. Only by staying one step ahead of cyber threats can companies hope to protect their sensitive data and maintain the trust of their customers.

Source link

Latest articles

F5 incorporates API Security and Networking to tackle AI Onslaught

In a groundbreaking move, the tech industry was abuzz with the announcement of the...

Australia regulator takes legal action against FIIG Securities for cybersecurity lapses

Australia regulator, the Australian Securities and Investments Commission (ASIC), has taken legal action against...

Managing unmanaged devices in the enterprise

Unmanaged devices on an organization's network can pose significant security risks and compliance issues....

INE Security Alert: Leveraging AI-Driven Cybersecurity Training to Combat Emerging Threats

Cary, North Carolina - In light of the growing surge of Artificial Intelligence (AI)-powered...

More like this

F5 incorporates API Security and Networking to tackle AI Onslaught

In a groundbreaking move, the tech industry was abuzz with the announcement of the...

Australia regulator takes legal action against FIIG Securities for cybersecurity lapses

Australia regulator, the Australian Securities and Investments Commission (ASIC), has taken legal action against...

Managing unmanaged devices in the enterprise

Unmanaged devices on an organization's network can pose significant security risks and compliance issues....