Menu
Attackers are hunting for tampered Juniper firewalls

Attackers are hunting for tampered Juniper firewalls

A 'honeypot' mimicking a Juniper firewall is seeing login attempts

An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.

The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall.

The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.

Juniper said last Thursday that it found during an internal audit two instances of unauthorized code in some versions of ScreenOS, which runs its NetScreen model of enterprise firewalls.

One problem was a hard-coded password, which could allow an attacker to log into a firewall using SSH or telnet in combination with a valid username.

The password was published on Sunday by the security firm Rapid7, which had been analyzing ScreenOS.

Juniper released patches for the password issue and another problem, which could allow VPN traffic to be monitored and decrypted.

Administrators were advised to patch immediately, and Juniper's revelation has received wide attention in the security community. But that still doesn't mean every company has patched, which puts them at risk.

Attackers often quickly try to take advantage of security vulnerabilities after patches are issued in hope of catching out organizations that are slow to react.

Ullrich wrote that the honeypot saw "numerous" login attempts over SSH using the hard-coded password. The attackers also tried various usernames, such as "root," "admin" and "netscreen."

"Our honeypot doesn't emulate ScreenOS beyond the login banner, so we do not know what the attackers are up to, but some of the attacks appear to be 'manual' in that we do see the attacker trying different commands," Ullrich wrote.

One of the IP addresses listed as the source for some of probes was flagged as belonging to the network security company Qualys, possibly attempting to estimate how many systems remain unpatched.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments