Menu
Juniper faces many questions after spying code planted in software

Juniper faces many questions after spying code planted in software

Who were the attackers and how did they get in?

The discovery of spying code nestled deeply in Juniper's networking equipment, the latest example of a major IT vendor caught up in an damaging cyberattack,  raises many questions.

Juniper said Thursday that one of its firewall operating systems had been modified to allow secret access, posing a huge threat to companies and organizations using the equipment.

Security experts wondered how the modifications could have been made years ago to some of Juniper's most sensitive source code without it knowing until recently. Companies try to vigorously protect their source code, which is an IT company's core intellectual property.

But the fact that Juniper's Chief Information Officer, Bob Worrell, came forward with the findings has been met with praise, although there is hope the company will soon provide greater detail.

A Juniper spokeswoman said Sunday the company did not have more information to share.

"I think Juniper did the right thing here," said HD Moore, chief research officer for the security firm Rapid7, via email. "I suspect that this incident will trigger internal security audits across the industry and cause Juniper to drastically change their code review process." 

Juniper's approach with customers may reflect that taken by EMC's RSA unit, wrote Alex Stamos, Facebook's chief security officer. In March 2011, RSA revealed that hackers had stolen critical information about its one-time passcode product called SecurID.

"I expect they are briefing big customers privately to control the sales damage, a la RSA after their incident," Stamos wrote.

Two major problems were found in Juniper's NetScreen OS. One was a hard-coded password that could allow any attacker with a valid username to log into one of Juniper's firewalls running its NetScreen OS using telnet or SSH.

On Sunday, Moore wrote on Rapid7's blog that his company had discovered that hard-coded password, which had been cleverly crafted to not look like a password.

Since the password is now public, it poses a great risk to organizations that have not patched their Juniper devices. Moore wrote he found 26,000 Internet-facing NetScreen devices that have SSH available using Shodan, a specialized search engine for querying Internet-connected devices.

The second vulnerability can allow VPN traffic to be monitored and decrypted. VPNs are encrypted connections between a user and another computer and are often used by companies to allow secure remote access to their systems for employees who are traveling.

There are many questions that Juniper will face in the coming days, such as how the attackers were able to infiltrate so deeply into the company's systems undetected and what it will do now to keep them out.

Matt Blaze, an associate professor of computer and information science at the University of Pennsylvania, wrote on Twitter that Juniper should "keep details coming, for the sake of the community."

"I understand the natural corporate PR instinct is to shut up about something like this, but that's not the right thing to do here," Blaze wrote.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Brand Post

How to become the best IT MSP

This article provides guidance for managed service providers (MSPs) that want to grow their business. It is also useful for any IT service provider looking to move from the break-fix model to managed IT services.

Featured

Slideshows

Reseller News Innovation Awards 2019: meet the winners

Reseller News Innovation Awards 2019: meet the winners

Reseller News honoured the standout players of the New Zealand channel in front of more than 480 technology leaders in Auckland on 23 October, recognising the achievements of top partners, emerging entrants and innovative start-ups.

Reseller News Innovation Awards 2019: meet the winners
Malwarebytes shoots the breeze with channel, prospects

Malwarebytes shoots the breeze with channel, prospects

A Kumeu, Auckland, winery was the venue for a Malwarebytes event for partner and prospect MSPs - with some straight shooting on the side. The half-day getaway, which featured an archery competition, lunch and wine-tasting aimed at bringing Malwarebytes' local New Zealand and top and prospective MSP partners together to celebrate recent local successes, and discuss the current state of malware in New Zealand. This was also a unique opportunity for local MSPs to learn about how they can get the most out of Malwarebytes' MSP program and offering, as more Kiwi businesses are targeted by malware.

Malwarebytes shoots the breeze with channel, prospects
Show Comments