Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers

The Hacker News by The Hacker News
January 23, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 23, 2025Ravie LakshmananMalware / Enterprise Security

Enterprise-grade Juniper Networks routers have become the target of a custom backdoor as part of a campaign dubbed J-magic.

According to the Black Lotus Labs team at Lumen Technologies, the activity is so named for the fact that the backdoor continuously monitors for a “magic packet” sent by the threat actor in TCP traffic.

“J-magic campaign marks the rare occasion of malware designed specifically for JunoOS, which serves a similar market but relies on a different operating system, a variant of FreeBSD,” the company said in a report shared with The Hacker News.

Cybersecurity

Evidence gathered by the company shows that the earliest sample of the backdoor dates back to September 2023, with the activity ongoing between mid-2023 and mid-2024. Semiconductor, energy, manufacturing, and information technology (IT) sectors were the most targeted.

Infections have been reported across Europe, Asia, and South America, including Argentine, Armenia, Brazil, Chile, Colombia, Indonesia, the Netherlands, Norway, Peru, the U.K., the U.S., and Venezuela.

The campaign is notable for deploying an agent after gaining initial access through an as-yet-undetermined method. The agent, a variant of a publicly available backdoor referred to as cd00r, waits for five different pre-defined parameters before commencing its operations.

On the receipt of these magic packets, the agent is configured to send back a secondary challenge, following which J-magic establishes a reverse shell to the IP address and port specified in the magic packet. This enables the attackers to control the device, steal data, or deploy additional payloads.

Lumen theorized that the inclusion of the challenge is an attempt on part of the adversary to prevent other threat actors from issuing magic packets in an indiscriminate manner and repurpose the J-magic agents to meet their own objectives.

It’s worth noting that another variant of cd00r, codenamed SEASPY, was deployed in connection with a campaign aimed at Barracuda Email Security Gateway (ESG) appliances in late 2022.

That said, there is no evidence at this stage to connect the two campaigns, nor does the J-magic campaign demonstrate any signs that it overlaps with other campaigns targeting enterprise-grade routers such as Jaguar Tooth and BlackTech (aka Canary Typhoon).

Cybersecurity

A majority of the potentially impacted IP addresses are said to be Juniper routers acting as VPN gateways, with a second smaller cluster comprising those with an exposed NETCONF port. It’s believed that the network configuration devices may have been targeted for their ability to automate router configuration information and management.

With routers being abused by nation-state actors preparing for follow-on attacks, the latest findings underscore the continued targeting of edge infrastructure, largely driven by the long uptime and a lack of endpoint detection and response (EDR) protections in such devices.

“One of the most notable aspects of the campaign is the focus on Juniper routers,” Lumen said. “While we have seen heavy targeting of other networking equipment, this campaign demonstrates that attackers can find success expanding to other device types such as enterprise grade routers.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
New Research: The State of Web Exposure 2025

New Research: The State of Web Exposure 2025

Recommended.

Why DNS Security Is Your First Defense Against Cyber Attacks?

Why DNS Security Is Your First Defense Against Cyber Attacks?

June 11, 2025
TerraMaster Spring Sale Upgraded: Up to 30% Off More NAS/DAS Products, Including New Flagship Deals

TerraMaster Spring Sale Upgraded: Up to 30% Off More NAS/DAS Products, Including New Flagship Deals

March 24, 2026

Trending.

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

November 19, 2025
Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

April 23, 2025
Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

May 5, 2025
Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

February 7, 2025
Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

May 8, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio