Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A custom backdoor exploiting the Magic Packet vulnerability in Juniper routers
Global Security

A custom backdoor exploiting the Magic Packet vulnerability in Juniper routers

AdminBy AdminJanuary 23, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 23, 2025Ravi LakshmananMalware / Enterprise Security

Juniper Networks’ enterprise-class routers have been targeted by a custom backdoor in a campaign called J-magic.

According to the Black Lotus Labs team at Lumen Technologies, this activity got its name because the backdoor continuously tracks the “magic packet” sent by the threat in TCP traffic.

“J-magic is reporting a rare case of malware specifically designed for JunoOS, which serves a similar market but relies on a different operating system, a variant of FreeBSD,” the company said in a statement. said in a report shared with The Hacker News.

Cyber ​​security

Data collected by the company shows that the earliest sample of the backdoor is dated to September 2023, and activity continued from mid-2023 to mid-2024. The semiconductor, energy, manufacturing and information technology (IT) sectors were the most targeted.

Infections have been reported in Europe, Asia and South America, including Argentina, Armenia, Brazil, Chile, Colombia, Indonesia, the Netherlands, Norway, Peru, Great Britain, the United States and Venezuela.

The company is notable for deploying the agent after gaining initial access in an as-yet unspecified way. Agent, a variant of a public backdoor called cd00rwaits for five different predefined parameters before starting its operations.

After receiving these magic packets, the agent is configured to send a secondary call, after which J-magic creates a reverse envelope for the IP address and port specified in the magic packet. This allows attackers to control the device, steal data, or deploy additional payloads.

Lumen speculated that enabling the challenge was an attempt by the adversary to prevent other threat actors from indiscriminately releasing magic packets and repurposing J-magic agents to achieve their own goals.

It should be noted that another variant is codenamed cd00r MARITIMEwas deployed in connection with a campaign targeting Barracuda Email Security Gateway (ESG) devices in late 2022.

However, at this stage there is no evidence of a connection between the two companies, nor does J-magic show any signs that it intersects with other companies targeting enterprise routers such as Jaguar’s tooth and BlackTech (aka Canary Typhoon).

Cyber ​​security

Most of the potentially affected IP addresses are said to be Juniper routers acting as VPN gateways, with a second smaller cluster consisting of those with open NETCONF port. It is believed that network configuration tools may have been targeted for their ability to automate router configuration information and management.

As routers abuse nation-state actors preparing for the next attacks, the latest findings highlight the continued focus on regional infrastructurewhich is mainly due to the long uptime and lack of endpoint protection and response (EDR) in such devices.

“One of the most notable aspects of the company is the focus on Juniper routers,” Lumen said. “While we’ve seen serious attacks against other network equipment, this campaign demonstrates that attackers can succeed by expanding to other types of devices, such as enterprise-grade routers.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.