Menu
Juniper faces many questions after spying code planted in software

Juniper faces many questions after spying code planted in software

Who were the attackers and how did they get in?

The discovery of spying code nestled deeply in Juniper's networking equipment, the latest example of a major IT vendor caught up in an damaging cyberattack,  raises many questions.

Juniper said Thursday that one of its firewall operating systems had been modified to allow secret access, posing a huge threat to companies and organizations using the equipment.

Security experts wondered how the modifications could have been made years ago to some of Juniper's most sensitive source code without it knowing until recently. Companies try to vigorously protect their source code, which is an IT company's core intellectual property.

But the fact that Juniper's Chief Information Officer, Bob Worrell, came forward with the findings has been met with praise, although there is hope the company will soon provide greater detail.

A Juniper spokeswoman said Sunday the company did not have more information to share.

"I think Juniper did the right thing here," said HD Moore, chief research officer for the security firm Rapid7, via email. "I suspect that this incident will trigger internal security audits across the industry and cause Juniper to drastically change their code review process." 

Juniper's approach with customers may reflect that taken by EMC's RSA unit, wrote Alex Stamos, Facebook's chief security officer. In March 2011, RSA revealed that hackers had stolen critical information about its one-time passcode product called SecurID.

"I expect they are briefing big customers privately to control the sales damage, a la RSA after their incident," Stamos wrote.

Two major problems were found in Juniper's NetScreen OS. One was a hard-coded password that could allow any attacker with a valid username to log into one of Juniper's firewalls running its NetScreen OS using telnet or SSH.

On Sunday, Moore wrote on Rapid7's blog that his company had discovered that hard-coded password, which had been cleverly crafted to not look like a password.

Since the password is now public, it poses a great risk to organizations that have not patched their Juniper devices. Moore wrote he found 26,000 Internet-facing NetScreen devices that have SSH available using Shodan, a specialized search engine for querying Internet-connected devices.

The second vulnerability can allow VPN traffic to be monitored and decrypted. VPNs are encrypted connections between a user and another computer and are often used by companies to allow secure remote access to their systems for employees who are traveling.

There are many questions that Juniper will face in the coming days, such as how the attackers were able to infiltrate so deeply into the company's systems undetected and what it will do now to keep them out.

Matt Blaze, an associate professor of computer and information science at the University of Pennsylvania, wrote on Twitter that Juniper should "keep details coming, for the sake of the community."

"I understand the natural corporate PR instinct is to shut up about something like this, but that's not the right thing to do here," Blaze wrote.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

Ingram Micro completed its nationwide roadshow in Auckland last month, kicking off its Innovation Hour series with Hewlett Packard Enterprise. Uncovering the latest in storage, networking and servers, the event outlined key market trends for resellers in 2016 and beyond.

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise
IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

FireEye welcomed 143 channel partners and distributors to FireEye's 2016 annual Partner Conference, FireEye A/NZ Momentum - held at Establishment in Sydney. Delegates heard from senior trans-Tasman channel leaders, marketing and the product divisions in the morning, with FireEye customers, incident responders and threat intelligence analysts sharing knowledge during the afternoon.

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference
​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

With New Zealand businesses now open to innovation, the industry sits on the cusp of significant disruption in the data centre. Driven by software-defined networking, the future of the data centre is fast becoming reality, as the channel seeks to keep up, keep innovating and keep growing. APC by Schneider Electric, Lenovo and key partners outlined how the channel can capitalise at The Grill restaurant in Auckland.

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​
Show Comments