Backdoored firmware lets China state hackers control routers with “magic packets”::The modified firmware used by BlackTech is hard to detect.
I suppose magic packets are not the packets for wake over lan, right? Because wol packages are commonly called magic packages too.
From what I gather it’s closer to a port knock than magic packets
In an advisory of its own, Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities.
If they aren’t exploiting vulnerabilities (and this is all because of mishandling of admin creds) then why are only Cisco routers being targeted?
PC firmware is also largely written in China. Think about this the next time you’re considering a “cheap” Lenovo laptop.
deleted by creator
This is the best summary I could come up with:
The threat actor is somehow gaining administrator credentials to network devices used by subsidiaries and using that control to install malicious firmware that can be triggered with “magic packets” to perform specific tasks.
In an advisory of its own, Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities.
Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products.
Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware, the company said.
BlackTech members use the modified firmware to override code in the legitimate firmware to add the SSH backdoor, bypass logging, and monitor incoming traffic for “magic packets.” The term refers to small chunks of data the attackers send to the infected routers.
While they appear random and innocuous in system logs, these packets allow the attackers to surreptitiously enable or disable the backdoor functionality.
The original article contains 522 words, the summary contains 160 words. Saved 69%. I’m a bot and I’m open source!