Cybersecurity Firm Warns of New Cyber Espionage Tactic by Chinese Hackers

5Mind. The Meme Platform
The Epoch Times Header

Chinese state-backed hackers took advantage of outdated hardware and software to access routers and take over computer networks.

A Chinese hacker group is targeting routers made by a major U.S. manufacturer, taking advantage of outdated software and hardware to hijack routers and access computer networks, a cybersecurity firm warned Wednesday.

It’s a new tactic in an increasingly sophisticated cybercrime landscape, according to the firm.

Mandiant, a Google subsidiary known for outing Chinese hackers, reported in a blog post March 12 that the state-backed hacker group UNC3886 targeted routers made by Juniper Networks.

The Silicon Valley-based tech company is a main competitor to Cisco, the leader in the U.S. router market. While many Juniper products are manufactured in China and other parts of Southeast Asia, most of its higher-end products are assembled in North America.

In mid-2024, Mandiant found that attackers had deployed a program that accessed victims’ computers by disabling login mechanisms.

Once in the system, the program could carry out active backdoor functions, which directly interfered with the system, or passive backdoor functions—“eavesdropping” or gathering information.

Mandiant noted that the back doors were based on an open-source, low-maintenance program named TINYSHELL.

According to Mandiant, the vulnerability that enabled the intrusions was the use of routers running outdated or “end-of-life” hardware and software.

A New Tactic

Mandiant noted that in 2022 and 2023, it reported that hacker group UNC3886 had breached server software such as VMware ESXi, Linux vCenter servers, and Windows virtual machines.

Wednesday’s blog post described “a development in UNC3886’s tactics, techniques and procedures,” and a focus on devices that may lack security monitoring and detection solutions.

Compromising routing devices is a new espionage tactic, the report said, “as it grants the capability for a long-term, high-level access to the crucial routing infrastructure, with a potential for more disruptive actions in the future.”

Mandiant described UNC3886 as “highly adept.” The hacker group’s modus operandi is to acquire “legitimate credentials” and use them to operate undetected.

Historically, the group has targeted network devices and virtualization technologies with “zero-day exploits,” cyber attacks that take advantage of previously unknown vulnerabilities in software, hardware, or firmware before vendors have a chance to patch them.

By Dave Malyon

Read Full Article on TheEpochTimes.com

Contact Your Elected Officials
The Epoch Times
The Epoch Timeshttps://www.theepochtimes.com/
Tired of biased news? The Epoch Times is truthful, factual news that other media outlets don't report. No spin. No agenda. Just honest journalism like it used to be.

Taking the Hype Out of Hypotheticals

There is a growing tendency in our national debate to substitute emotion for precision. Immigration enforcement is no longer discussed primarily as policy.

Are Epstein’s Worst Sins Being Confirmed?

WARNING: THIS ARTICLE HAS DISTURBING CONTENT OF A SENSITIVE...

Sadly, Minnesota has become a battleground, once again

Minnesota is again a battleground. Five years after George Floyd protests, demonstrators now target ICE agents enforcing the law.

Stolen Land or Stolen Context?: What We Are No Longer Teaching Our Children

To assess whether “stolen land” is accurate, we must examine how U.S. land was acquired — historically, not emotionally or rhetorically.

Repeal the National Childhood Vaccine Injury Act: The Original Petition

In 1986, Congress granted vaccine makers unique legal protections, shielding them from most lawsuits over injuries caused by vaccines.

Don Lemon Pleads Not Guilty in Minnesota Church Protest Case

Don Lemon pleaded not guilty to violating federal civil rights laws through involvement with a Minnesota church protest.

Arizona Sheriff Denies Claims He’s Blocking FBI From Evidence in Guthrie Case

Arizona sheriff says gloves found in Savannah Guthrie’s mother’s disappearance probe, denies withholding evidence from FBI.

Border Czar Says End in ICE Operation Surge in Minnesota Not an Entire Pullback

White House border czar Tom Homan said ending the Trump-era immigration enforcement surge in Minnesota doesn’t mean agents are fully withdrawing.

Texas Attorney General Backs Doctor Against State’s Own Medical Board Over Ivermectin Use

Texas AG Ken Paxton backs a doctor reprimanded by the state medical board for prescribing ivermectin to COVID-19 patients.

US, Taiwan Reach Trade Deal to Cut Tariffs, Boost Purchases of US Goods

U.S. and Taiwan sign trade deal with 15% tariff on Taiwanese imports, expanding U.S. access for beef, pork, dairy, wheat, and autos.

EPA Rescinds Obama-Era Finding That Served as Basis for Climate Regulation

President Trump and EPA Administrator Lee Zeldin moved to rescind the 2009 finding that underpins federal greenhouse gas regulations.

Trump Warns Republicans Will ‘Suffer the Consequences’ If They Vote Against Tariffs

President Trump warned GOP lawmakers they’ll face consequences if they oppose his tariff agenda after some sided with Democrats on a measure.

Trump Orders Military to Purchase Electricity From Coal-Fueled Power Plants

President Donald Trump signed an executive order on Feb. 11 directing the U.S. military to purchase its power from coal-fired electricity plants.
spot_img

Related Articles

Popular Categories

MAGA Business Central