Summary

  • A newly discovered backdoor, which has affected dozens of enterprise VPNs running on Juniper Networks’ Junos OS, is using a ‘magic packet’ technique to counter unauthorised access to the malware, according to researchers at Lumen Technology’s Black Lotus Labs.
  • The backdoor, dubbed ‘J-Magic’, resides in memory, making detection difficult, and waits for a packet, embedded in normal TCP traffic, that triggers it to encrypt a challenge using the public part of an RSA key.
  • The backdoor then requires the correct respondent to respond with the corresponding plaintext, proving they have access to the secret key.
  • The technique is a “tradecraft worthy of further observation”, according to the researchers, however, they are still unsure of how the malware is installed.
  • The finding demonstrates that malware developers are constantly striving to develop and innovate their evasion techniques in order to stay ahead of the game.

By Dan Goodin

Original Article