At a glance.
- Chinese threat actor targets Juniper routers.
- CISA issues advisory on Medusa ransomware.
- Facebook warns of actively exploited FreeType vulnerability.
Chinese threat actor targets Juniper routers.
Mandiant warns that the China-aligned threat actor UNC3886 last year deployed new custom malware on Juniper Networks’ Junos OS routers. The TINYSHELL-based backdoors "had varying custom capabilities, including active and passive backdoor functions, as well as an embedded script that disables logging mechanisms on the target device." The infected routers were running end-of-life hardware and software, and Mandiant recommends that organizations "upgrade their Juniper devices to the latest images released by Juniper Networks, which includes mitigations and updated signatures for the Juniper Malware Removal Tool (JMRT)."
Juniper released its own advisory on the campaign, stating, "We identified two generic Remote Access Toolkits, jdosd and irad. A Local Access Toolkit (lmpad) was also discovered that appears to be specifically engineered to attack Junos OS devices. Finally, three more implants—appid, to, and oemd—are RATs based on the TinyShell UNIX backdoor. All these implants are designed for the exact same purpose, to provide persistent backdoors on long-running Junos OS devices."