Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

The cyber espionage group known as UNC3886, with ties to China, has recently been targeting end-of-life MX routers from Juniper Networks in a campaign aimed at deploying custom backdoors. These backdoors have various custom capabilities, including active and passive functions, as well as a script that disables logging mechanisms on the target device, according to a report from Mandiant, a subsidiary of Google.

This group’s tactics have evolved over time, moving from exploiting zero-day vulnerabilities in devices from companies like Fortinet, Ivanti, and VMware to now focusing on Juniper routers. UNC3886, first identified in September 2022, is considered highly skilled and has the ability to target edge devices and virtualization technologies to access defense, technology, and telecommunication organizations in the US and Asia.

One of the notable aspects of their recent activities is the use of implants based on TinyShell, a C-based backdoor previously used by other Chinese hacking groups. This tool offers flexibility and adaptability, making it a preferred choice for targeting Linux-based systems.

Mandiant has identified six distinct TinyShell-based backdoors used by UNC3886, each with unique capabilities, such as file upload/download, remote shell, and packet sniffing. These backdoors are designed to circumvent security measures like Junos OS’ Verified Exec protections to gain privileged access and execute malicious payloads.

In response to these threats, organizations are advised to update their Juniper devices with the latest releases from the company, which include mitigations and updated signatures for the Juniper Malware Removal Tool (JMRT). This proactive measure can help prevent potential attacks and secure network infrastructure.

The ongoing efforts by UNC3886 underscore the group’s deep understanding of advanced system internals and their focus on stealth and long-term persistence. By using passive backdoors and tampering with logs and forensics artifacts, they aim to operate undetected while maintaining access to compromised devices.

As cybersecurity threats continue to evolve, it is essential for organizations to stay vigilant and update their security measures to protect against sophisticated adversaries like UNC3886.

(This content has been adapted from a report by Mandiant and responses from Juniper Networks for WordPress integration.)