Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Paragon is not collaborating with Italian authorities probing spyware attacks, report says

April 28, 2026

Microsoft cuts OpenAI revenue share as their AI alliance loosens

April 28, 2026
Facebook X (Twitter) Instagram
Trending
  • Investors trust Google more than Meta when comes to spending on AI
  • Paragon is not collaborating with Italian authorities probing spyware attacks, report says
  • Microsoft cuts OpenAI revenue share as their AI alliance loosens
  • Robotically assembled building blocks could make construction more efficient and sustainable | MIT News
  • AI showdown: Musk and Altman go to trial in fight over OpenAI’s beginnings
  • U.S., Iran seize ships as war evolves into standoff over Strait of Hormuz
  • Google launches training and inference TPUs in latest shot at Nvidia
  • Zoom teams up with World to verify humans in meetings
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Thursday, May 7
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » China-Nexus Group Hacked Juniper Networks and Implant Backdoors on Its Routers

China-Nexus Group Hacked Juniper Networks and Implant Backdoors on Its Routers

GTBy GTMarch 16, 2025 Cybersecurity No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


China-Nexus Group Hacked Juniper Networks and Implant Backdoors on Its Routers

In a significant cybersecurity breach discovered in mid-2024, a sophisticated threat actor deployed custom backdoors on Juniper Networks’ Junos OS routers.

The intrusion represents an alarming development in the targeting of critical network infrastructure by nation-state actors, with potential implications for telecommunications and national security worldwide.

The affected Juniper MX routers were running end-of-life hardware and software, making them particularly vulnerable to such sophisticated attacks.

Analysts at Google’s Mandiant identified several TINYSHELL-based backdoors operating on the compromised routers and attributed these attacks to a China-nexus espionage group designated as UNC3886.

The group is known for its advanced capabilities and focus on targeting network devices and virtualization technologies with zero-day exploits.

Their interests appear primarily directed at defense, technology, and telecommunication organizations located in the United States and Asia.

The investigation revealed that UNC3886 leveraged legitimate credentials to gain privileged access to the routers and subsequently deployed six distinct malware variants across multiple Juniper MX devices.

These backdoors were designed to establish persistent access while evading detection, demonstrating the threat actor’s in-depth knowledge of Junos OS system internals.

Each backdoor implemented various capabilities including file transfer, remote shell access, and proxy functionalities.

One of the most concerning aspects of this attack was the group’s ability to circumvent Juniper’s Verified Exec (veriexec) protection system.

This kernel-based file integrity subsystem is designed to protect the operating system against unauthorized code execution.

However, UNC3886 successfully bypassed this protection using a process injection technique tracked as CVE-2025-21590.

Malware Analysis

The attackers employed a sophisticated approach by modifying open-source TINYSHELL backdoor code to create customized malware for the Junos OS environment.

One sample named “appid” communicated with hardcoded command and control servers including TCP://129.126.109.50:22 and TCP://116.88.34.184:22, encrypting all network traffic with AES using a hard-coded key.

The malware supported various commands for file transfer, shell access, and proxy establishment:-

tshd_get_file # Sends a file to the server
tshd_put_file # Downloads a file from the server
tshd_runshell # Launches an interactive /bin/sh shell session
tshd_setproxy # Establish a Socks proxy to a given IP+port
tshd_config # Change Configuration Menu

Particularly concerning was the “lmpad” backdoor that could execute an external script to inhibit logging by patching legitimate processes, effectively disabling auditing functions before operator activity and later restoring logs after disconnection.

This enabled the attackers to conduct hands-on activities without generating suspicious log entries, running commands like:-

sed -i ” ‘/root/d’ /var/log/interactive-commands
sed -i ” -e ‘/vi/d’ -e ‘/set/d’ -e ‘/gdb/d’ -e ‘/mgd/d’ /root/.history
sed -i ” ‘/root/d’ /var/log/messages
sed -i ” ‘/root/d’ /var/log/auth

The compromise of these critical routing devices highlights a dangerous trend in espionage operations, granting attackers long-term, high-level access to crucial infrastructure with potential for more disruptive actions in the future.

Organizations are strongly advised to upgrade their Juniper devices to the latest images and implement robust security measures to protect their network infrastructure.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.



Source link

GT
  • Website

Keep Reading

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

Top 10 Best Server Monitoring Tools

10 Best Cybersecurity Risk Management Tools

Best DDoS Protection Tools & Services in 2026 (Reviewed)

20 Best Malware Protection Solutions In 2026

10 Most Notable Cyber Attacks of 2026

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Google launches training and inference TPUs in latest shot at Nvidia

April 27, 2026

Meta tracks employee usage on Google, LinkedIn AI training project

April 25, 2026

Meta will cut 10% of workforce as company pushes deeper into AI

April 24, 2026
Latest Posts

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

April 1, 2026

Top 10 Best Server Monitoring Tools

April 1, 2026

10 Best Cybersecurity Risk Management Tools

March 31, 2026

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2026 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.