Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Best Backpacking Tents (2025), WIRED-Tested and Reviewed
    • Microcurrent Devices: Do They Work and Are They Worth It? We Asked Skin Experts
    • Will Musk’s explosive row with Trump help or harm his businesses?
    • 7 AI Hentai Girlfriend Chat Websites No Filter
    • Rugged 360 camera for extreme environments unveiled
    • Uber Just Reinvented the Bus … Again
    • SAVE Student Loan Update: Don’t Expect to Make Payments This Year, but Do This One Thing ASAP
    • How AI Girlfriend Chatbots Create Unique Interactions
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, June 7
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Backdoor infecting VPNs used “magic packets” for stealth and security
    News

    Backdoor infecting VPNs used “magic packets” for stealth and security

    Editor Times FeaturedBy Editor Times FeaturedJanuary 27, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    When menace actors use backdoor malware to achieve entry to a community, they wish to be certain that all their laborious work can’t be leveraged by competing teams or detected by defenders. One countermeasure is to equip the backdoor with a passive agent that continues to be dormant till it receives what’s identified within the enterprise as a “magic packet.” On Thursday, researchers revealed {that a} never-before-seen backdoor that quietly took maintain of dozens of enterprise VPNs working Juniper Community’s Junos OS has been doing simply that.

    J-Magic, the monitoring identify for the backdoor, goes one step additional to forestall unauthorized entry. After receiving a magic packet hidden within the regular movement of TCP visitors, it relays a problem to the system that despatched it. The problem comes within the type of a string of textual content that’s encrypted utilizing the general public portion of an RSA key. The initiating get together should then reply with the corresponding plaintext, proving it has entry to the key key.

    Open sesame

    The light-weight backdoor can be notable as a result of it resided solely in reminiscence, a trait that makes detection tougher for defenders. The mixture prompted researchers at Lumen Expertise’s Black Lotus Lab to sit down up and take discover.

    “Whereas this isn’t the primary discovery of magic packet malware, there have solely been a handful of campaigns in recent times,” the researchers wrote. “The mixture of concentrating on Junos OS routers that function a VPN gateway and deploying a passive listening in-memory solely agent, makes this an attention-grabbing confluence of tradecraft worthy of additional statement.”

    The researchers discovered J-Magic on VirusTotal and decided that it had run contained in the networks of 36 organizations. They nonetheless don’t understand how the backdoor bought put in. Right here’s how the magic packet labored:

    The passive agent is deployed to quietly observe all TCP visitors despatched to the system. It discreetly analyzes the incoming packets and watches for one in every of 5 particular units of knowledge contained in them. The circumstances are obscure sufficient to mix in with the traditional movement of visitors that community protection merchandise gained’t detect a menace. On the similar time, they’re uncommon sufficient that they’re not prone to be present in regular visitors.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Millions of low-cost Android devices turn home networks into crime platforms

    June 7, 2025

    Anthropic releases custom AI chatbot for classified spy work

    June 6, 2025

    An interview with ASML CEO Christophe Fouquet, as the company navigates political instability in The Netherlands and abroad and the impacts of Trump’s trade war (Adam Satariano/New York Times)

    June 6, 2025

    “In 10 years, all bets are off”—Anthropic CEO opposes decadelong freeze on state AI laws

    June 5, 2025

    Two certificate authorities booted from the good graces of Chrome

    June 4, 2025

    Meta and Yandex are de-anonymizing Android users’ web browsing identifiers

    June 3, 2025

    Comments are closed.

    Editors Picks

    Best Backpacking Tents (2025), WIRED-Tested and Reviewed

    June 7, 2025

    Microcurrent Devices: Do They Work and Are They Worth It? We Asked Skin Experts

    June 7, 2025

    Will Musk’s explosive row with Trump help or harm his businesses?

    June 7, 2025

    7 AI Hentai Girlfriend Chat Websites No Filter

    June 7, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    OpenAI adds GPT-4.1 to ChatGPT amid complaints over confusing model lineup

    May 18, 2025

    The University as Innovation Incubator

    June 4, 2025

    Google threatened with break-up by US

    October 9, 2024
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.