1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Attackers are hunting for tampered Juniper firewalls

Discussion in 'CSO' started by RSS, Dec 22, 2015.

  1. RSS

    RSS New Member Member

    An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.

    The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall.

    The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page