Sunday, April 13, 2025
HomeCyber Security NewsHackers Actively Scanning for Juniper Smart Routers Using Default Passwords

Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords

Published on

SIEM as a Service

Follow Us on Google News

Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper’s Session Smart Networking Platform (SSR).

According to SANS tech reports, Attackers are focusing their efforts on exploiting devices using the default credentials, “t128” as the username and “128tRoutes” as the password, which are remnants from Juniper’s acquisition of 128 Technologies.

The surge in scanning activity raises significant concerns for organizations relying on these smart routers.

- Advertisement - Google News

Incident Details

From March 23 to March 28, 2025, cybersecurity experts recorded a spike in scans specifically probing for the “t128” username.

Approximately 3,000 unique IP addresses were involved in these scans, indicating coordinated botnet activity, likely tied to a “Mirai-type” botnet.

Such botnets typically exploit known vulnerabilities or weak security configurations to compromise devices en masse.

What makes these scans particularly troubling is the fact that the default credentials for Juniper’s SSR platform have remained unchanged since its integration into Juniper’s portfolio.

Despite the product’s evolution, the username and password from its 128 Technologies roots persist in the documentation, which is easily accessible online. Hackers are now leveraging this publicly available information to locate vulnerable devices.

Impact on Organizations

Juniper’s Session Smart Routing is widely used for intelligent networking and traffic optimization.

Exploiting default credentials could give attackers unauthorized access, potentially leading to data exfiltration, lateral movement within networks, or even a hijacking of routing operations.

Devices left unsecured could become part of larger botnets, amplifying the impact of cyberattacks globally.

Worryingly, there have been reports from users indicating challenges in changing default passwords for the “root” or “t128” accounts.

The process reportedly lacks clarity, leaving some users exposed despite efforts to secure their devices. This could exacerbate the issue as organizations struggle to implement proper remediation measures.

Recommendations

For organizations using Juniper’s SSR devices, immediate action is imperative:

  1. Change Default Credentials: Ensure that the default “t128” account password is updated to a strong, unique password. If the password change process is unclear, consult Juniper’s technical support or documentation.
  2. Review Access Controls: Regularly audit device settings to confirm all accounts are properly secured. Disable unnecessary accounts or permissions.
  3. Monitor for Unusual Activity: Use intrusion detection systems to identify potential brute-force attempts or unauthorized logins targeting SSR devices.
  4. Update Firmware: Keep devices updated to the latest firmware version to mitigate vulnerabilities.

As cyberattacks continue to evolve, hackers are quick to exploit overlooked security flaws, such as default credentials.

The recent surge in scans targeting Juniper’s SSR platform serves as a stark reminder for organizations to prioritize basic security hygiene.

Default passwords are low-hanging fruit for attackers, and leaving such credentials unchanged creates unnecessary risk exposure.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...