Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers
  • Security Week

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

Ryan Naraine Published: March 12, 2025 | Updated: March 12, 2025 2 min read
0 views

Security researchers at Mandiant have discovered a series of custom backdoors deployed on end-of-life Juniper Networks Junos OS routers by a Chinese cyberespionage group that has historically targeted network devices.

According to Mandiant documentation, the backdoors were planted on end‑of‑life hardware and software and included bypasses for Junos OS’s veriexec subsystem, a kernel‑based file integrity protection mechanism.

Technical analysis shows that the attackers gained privileged access through legitimate credentials, entering the FreeBSD shell via the Junos OS CLI. Once inside, they employed process injection techniques to avoid triggering veriexec alerts. 

“The backdoors had varying custom capabilities, including active and passive backdoor functions, as well as an embedded script that disables logging mechanisms on the target device,” Mandiant warned.

The hacking operation, tagged as UNC3886, is described as a China-nexus hacking operation that has historically targeted network devices and virtualization technologies with zero-day exploits. 

The APT’s interests seem to be focused mainly on defense, technology, and telecommunication organizations located in the US and Asia, Mandiant said.

Mandiant researchers explained that the China-nexus group used a “here document” to generate a base64‑encoded file that was decoded into a compressed archive containing malicious payloads. 

After analyzing memory from compromised routers, Mandiant discovered that the  attackers injected payloads into a spawned process.  The company identified six modified TINYSHELL‑based malware samples, each with unique activation methods and capabilities tailored to Junos OS, highlighting the hacking team’s detailed understanding of the system internals.

Advertisement. Scroll to continue reading.

Mandiant said it observed the hackers targeting network authentication services, including the Terminal Access Controller Access-Control System (TACACS+), and terminal servers with access to the routers to gain privileged initial access.

“This privileged access allowed the threat actor to enter Junos OS shell mode and perform restricted operations. Investigating further actions taken by the threat actor was hampered by the challenges inherent in analyzing proprietary network devices, which required novel methods for artifact acquisition and analysis.”

The company released IOCs and YARA rules to help defender hunt for signs of infections. Mandiant is also recommending that organizations upgrade their Juniper devices to the latest images released by Juniper Networks, which includes mitigations and updated signatures for the Juniper Malware Removal Tool (JMRT). 

“Organizations should run the JMRT Quick Scan and Integrity Check after the upgrade,” Mandiant said.

Related: Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS

Related: VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products

Related: Juniper Warns of Mirai Botnet Targeting Session Smart Routers

Related: China’s Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs

About The Author

Ryan Naraine

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: 360 Privacy Raises $36 Million for Digital Executive Protection Platform
Next: Security Validation Firm Pentera Banks $60M Series D  

Author's Other Posts

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities Cybersecurity_News-SecurityWeek.jpg

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities

April 14, 2025 0 0
Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed Nvidia.jpeg

Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed

April 14, 2025 0 0
Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle Ivanti-e1736941837602.jpg

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

April 11, 2025 0 0
Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs White-House-Cybersecurity.jpg

Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs

April 10, 2025 0 0

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.