Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • TOP 100 Business Cards of history’s most important people
    • ‘100% Stupid’: MAGA World Is Cautiously Turning on Elon Musk
    • Today’s NYT Mini Crossword Answers for June 7
    • How I Automated My Machine Learning Workflow with Just 10 Lines of Python
    • Saudi Arabia and Egypt reportedly plan Red Sea crossing
    • Elon Musk’s Fight With Trump Threatens $48 Billion in Government Contracts
    • Millions of low-cost Android devices turn home networks into crime platforms
    • Resident Evil 9 Revealed at Summer Game Fest After Early Fake-Out
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, June 7
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Backdoor infecting VPNs used “magic packets” for stealth and security
    News

    Backdoor infecting VPNs used “magic packets” for stealth and security

    Editor Times FeaturedBy Editor Times FeaturedJanuary 27, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    When menace actors use backdoor malware to achieve entry to a community, they wish to be certain that all their laborious work can’t be leveraged by competing teams or detected by defenders. One countermeasure is to equip the backdoor with a passive agent that continues to be dormant till it receives what’s identified within the enterprise as a “magic packet.” On Thursday, researchers revealed {that a} never-before-seen backdoor that quietly took maintain of dozens of enterprise VPNs working Juniper Community’s Junos OS has been doing simply that.

    J-Magic, the monitoring identify for the backdoor, goes one step additional to forestall unauthorized entry. After receiving a magic packet hidden within the regular movement of TCP visitors, it relays a problem to the system that despatched it. The problem comes within the type of a string of textual content that’s encrypted utilizing the general public portion of an RSA key. The initiating get together should then reply with the corresponding plaintext, proving it has entry to the key key.

    Open sesame

    The light-weight backdoor can be notable as a result of it resided solely in reminiscence, a trait that makes detection tougher for defenders. The mixture prompted researchers at Lumen Expertise’s Black Lotus Lab to sit down up and take discover.

    “Whereas this isn’t the primary discovery of magic packet malware, there have solely been a handful of campaigns in recent times,” the researchers wrote. “The mixture of concentrating on Junos OS routers that function a VPN gateway and deploying a passive listening in-memory solely agent, makes this an attention-grabbing confluence of tradecraft worthy of additional statement.”

    The researchers discovered J-Magic on VirusTotal and decided that it had run contained in the networks of 36 organizations. They nonetheless don’t understand how the backdoor bought put in. Right here’s how the magic packet labored:

    The passive agent is deployed to quietly observe all TCP visitors despatched to the system. It discreetly analyzes the incoming packets and watches for one in every of 5 particular units of knowledge contained in them. The circumstances are obscure sufficient to mix in with the traditional movement of visitors that community protection merchandise gained’t detect a menace. On the similar time, they’re uncommon sufficient that they’re not prone to be present in regular visitors.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Millions of low-cost Android devices turn home networks into crime platforms

    June 7, 2025

    Anthropic releases custom AI chatbot for classified spy work

    June 6, 2025

    An interview with ASML CEO Christophe Fouquet, as the company navigates political instability in The Netherlands and abroad and the impacts of Trump’s trade war (Adam Satariano/New York Times)

    June 6, 2025

    “In 10 years, all bets are off”—Anthropic CEO opposes decadelong freeze on state AI laws

    June 5, 2025

    Two certificate authorities booted from the good graces of Chrome

    June 4, 2025

    Meta and Yandex are de-anonymizing Android users’ web browsing identifiers

    June 3, 2025

    Comments are closed.

    Editors Picks

    TOP 100 Business Cards of history’s most important people

    June 7, 2025

    ‘100% Stupid’: MAGA World Is Cautiously Turning on Elon Musk

    June 7, 2025

    Today’s NYT Mini Crossword Answers for June 7

    June 7, 2025

    How I Automated My Machine Learning Workflow with Just 10 Lines of Python

    June 7, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    One-Click LLM Bash Helper

    January 31, 2025

    Meta plans globe-spanning sub-sea internet cable

    February 20, 2025

    Prominent Cryptocurrency Investor Faces Senate Tax Inquiry

    February 15, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.