Attackers are hunting for tampered Juniper firewalls

A 'honeypot' mimicking a Juniper firewall is seeing login attempts

An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.

The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall.

The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.

Juniper said last Thursday that it found during an internal audit two instances of unauthorized code in some versions of ScreenOS, which runs its NetScreen model of enterprise firewalls.

One problem was a hard-coded password, which could allow an attacker to log into a firewall using SSH or telnet in combination with a valid username.

The password was published on Sunday by the security firm Rapid7, which had been analyzing ScreenOS.

Juniper released patches for the password issue and another problem, which could allow VPN traffic to be monitored and decrypted.

Administrators were advised to patch immediately, and Juniper's revelation has received wide attention in the security community. But that still doesn't mean every company has patched, which puts them at risk.

Attackers often quickly try to take advantage of security vulnerabilities after patches are issued in hope of catching out organizations that are slow to react.

Ullrich wrote that the honeypot saw "numerous" login attempts over SSH using the hard-coded password. The attackers also tried various usernames, such as "root," "admin" and "netscreen."

"Our honeypot doesn't emulate ScreenOS beyond the login banner, so we do not know what the attackers are up to, but some of the attacks appear to be 'manual' in that we do see the attacker trying different commands," Ullrich wrote.

One of the IP addresses listed as the source for some of probes was flagged as belonging to the network security company Qualys, possibly attempting to estimate how many systems remain unpatched.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?