Thursday, March 20, 2025
Homecyber securityChinese Hacked Exploit Juniper Networks Routers to Implant Backdoor

Chinese Hacked Exploit Juniper Networks Routers to Implant Backdoor

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have uncovered a sophisticated cyber espionage campaign targeting critical network infrastructure, marking a significant evolution in tactics by Chinese state-sponsored hackers.

Mandiant, a leading cybersecurity firm, has discovered multiple custom backdoors deployed on Juniper Networks‘ routers, attributing the activity to a Chinese espionage group known as UNC3886.

The backdoors provided attackers with persistent access to compromised networks while actively evading detection mechanisms.

In mid-2024, Mandiant discovered threat actors had deployed custom backdoors on Juniper Networks’ Junos OS routers, which form critical components of many organizational network infrastructures.

The APT Hackers attributed these backdoors to UNC3886, a highly skilled China-nexus cyber espionage group with a history of targeting network devices and virtualization technologies, particularly within defense, technology, and telecommunication organizations across the US and Asia.

Mandiant worked with Juniper Networks to investigate the activity and determined that the affected Juniper MX routers were running end-of-life hardware and software, making them particularly vulnerable to compromise.

The discovery builds upon Mandiant’s previous reports of UNC3886’s similar malware ecosystems deployed on virtualization technologies and network edge devices in 2022 and 2023.

This latest campaign demonstrates UNC3886’s continued focus on maintaining long-term access to victim networks while showing deep understanding of the underlying technology of targeted appliances.

Sophisticated TINYSHELL-Based Backdoors with Custom Capabilities

Mandiant’s investigation identified six distinct malware samples across multiple compromised Juniper MX routers.

Each sample was a modified version of a TINYSHELL backdoor – a lightweight backdoor written in C that communicates using a custom binary protocol – but with unique capabilities specifically designed for Junos OS.

The backdoors were cleverly disguised with names mimicking legitimate Juniper system processes, including “appid,” “to,” “irad,” “lmpad,” “jdosd,” and “oemd”.

The attackers demonstrated significant technical sophistication by circumventing Juniper’s Verified Exec (veriexec) protection system, which normally prevents unauthorized code execution.

UNC3886 achieved this by injecting malicious code into the memory of legitimate processes.

The backdoors incorporated both active variants that would initiate communication with command and control servers, and passive variants that would remain dormant until receiving specific network triggers.

Perhaps most concerning was the inclusion of code specifically designed to disable logging mechanisms on the target devices, effectively erasing evidence of the attackers’ activities.

Implications and Recommendations for Network Security

The compromises highlight a concerning trend of espionage-motivated adversaries targeting routing infrastructure, which typically lacks robust security monitoring solutions such as endpoint detection and response (EDR) agents.

This activity grants attackers long-term, high-level access to crucial routing infrastructure, with potential for more disruptive actions in the future.

Mandiant has issued several recommendations for organizations to protect themselves.

First and foremost, organizations should upgrade their Juniper devices to the latest software images released by Juniper Networks, which include mitigations and updated signatures for the Juniper Malware Removal Tool (JMRT).

After upgrading, organizations should run the JMRT Quick Scan and Integrity Check.

Additional recommendations include implementing robust multi-factor authentication, granular access control for network devices, enhanced monitoring of administrative activities, prioritizing vulnerability management, implementing a device lifecycle management program, strengthening security posture through access controls and segmentation, and leveraging threat intelligence to improve security controls.

As network infrastructure continues to be targeted by sophisticated threat actors, organizations must remain vigilant and proactive in their security measures to protect these critical systems that form the backbone of digital communications.

Indicators of Compromise

Host-Based Indicators

FilenameMalware FamilyMD5SHA1SHA256
appidTINYSHELL2c89a18944d3a895bd6432415546635e50520639cf77df0c15cc95076fac901e3d04b70898380ec6bf4e03d3ff490cdc6c48c37714450930e4adf82e6e14d244d8373888
iradTINYSHELLaac5d83d296df81c9259c9a533a8423a1a6d07da7e77a5706dd8af899ebe4daa74bbbe915bef7608d66112315eefff354dae42f49178b7498f994a728ae6203a8a59f5a2
jdosdTINYSHELL8023d01ffb7a38b582f0d598afb974ee06a1f879da398c00522649171526dc968f769093c0ec15e08b4fb3730c5695fb7b4a6b85f7fe341282ad469e4e141c40ead310c3
lmpadTINYSHELL5724d76f832ce8061f74b0e9f1dcad90f8697b400059d4d5082eee2d269735aa8ea2df9a5995aaff5a047565c0d7fe3c80fa354c40e7e8c3e7d4df292316c8472d4ac67a
oemdTINYSHELLe7622d983d22e749b3658600df00296dcf7af504ef0796d91207e41815187a793d430d85905b18d5df58dd6c16930e318d9574a2ad793ec993ad2f68bca813574e3d854b
toTINYSHELLb9e4784fa0e6283ce6e2094426a02fce01735bb47a933ae9ec470e6be737d8f646a8ec66e1de05a2832437ab70d36c4c05b43c4a57f856289224bbd41182deea978400ed
oemdTINYSHELLbf80c96089d37b8571b5de7cab14dd9fcec327e51b79cf11b3eeffebf1be8ac0d66e95293751997cfcb038e6b658e9180bc7cce28a3c25dbb892b661bcd1065723f11f7e
lmpadTINYSHELL3243e04afe18cc5e1230d49011e198992e9215a203e908483d04dfc0328651d79d35b54f7ae38a27494dd6c1bc9ab3c02c3709282e0ebcf1e5fcf59a57dc3ae56cfd13b4

Network Indicators

DescriptionIndicator
TINYSHELL Command and Control server129.126.109.50:22
TINYSHELL Command and Control server116.88.34.184:22
TINYSHELL Command and Control server223.25.78.136:22
TINYSHELL Command and Control server45.77.39.28:22
TINYSHELL Command and Control server101.100.182.122:22
TINYSHELL Command and Control server118.189.188.122:22
TINYSHELL Command and Control server158.140.135.244:22
TINYSHELL Command and Control server8.222.225.8:22

Are you from SOC/DFIR Teams?: Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the...