CarderPlanet
Professional
- Messages
- 2,549
- Reaction score
- 732
- Points
- 113
Who is behind the new wave of cyber attacks?
US and Japanese cybersecurity authorities and law enforcement agencies are warning about the actions of the Chinese hacker group BlackTech. This group disrupts network devices by installing specialized backdoors to access corporate networks.
A joint report prepared by the FBI, NSA, CISA, and Japanese authorities NISC and NPA reveals that a state-backed group attacks the network devices of international branches of large companies to further access the networks of corporate head offices.
BlackTech, also known as Palmerworm, Circuit Panda, and Radio Panda, has been actively engaged in cyber espionage against Japanese, Taiwanese, and Hong Kong organizations since 2010. The group's main objectives include government agencies, industrial enterprises, technology companies, media, electronic and telecommunications companies, and the defense industry.
The modified firmware allows attackers to hide configuration changes and the history of executed commands. In addition, they can disable the logging system on a compromised device during malicious actions.
Specifically, for Cisco routers, researchers observed how attackers enabled and disabled the SSH backdoor using specially crafted TCP or UDP packets directed to the devices. This method allows attackers to remain undetected and enable the backdoor only when necessary.
It was also noticed that attackers made corrections to the memory of Cisco devices to bypass the signature verification functions of Cisco ROM Monitor. This allows attackers to download modified firmware that has previously installed backdoors that allow unregistered access to the device.
If Cisco routers are compromised, hackers also change the EEM policies used to automate tasks, removing certain lines from legitimate commands to block their execution and make it more difficult for forensic analysis.
According to the warning, BlackTech hackers use specialized and regularly updated malware to create backdoors in network devices. These backdoors are used for permanent access, initial network entry, and data interception.
Special attention should be paid to the fact that malware is sometimes signed with stolen certificates, which makes it difficult for security systems to detect it.
The report also contains security recommendations: monitoring unauthorized downloads of bootloader images and firmware, as well as unusual device reboots. It is also recommended to pay attention to SSH traffic on the router and apply a number of other security measures.
It is important to note that attacks on network devices have become more frequent over the past year. According to research, Chinese hackers are also targeting Fortinet, TP-Link, and SonicWall devices.
US and Japanese cybersecurity authorities and law enforcement agencies are warning about the actions of the Chinese hacker group BlackTech. This group disrupts network devices by installing specialized backdoors to access corporate networks.
A joint report prepared by the FBI, NSA, CISA, and Japanese authorities NISC and NPA reveals that a state-backed group attacks the network devices of international branches of large companies to further access the networks of corporate head offices.
BlackTech, also known as Palmerworm, Circuit Panda, and Radio Panda, has been actively engaged in cyber espionage against Japanese, Taiwanese, and Hong Kong organizations since 2010. The group's main objectives include government agencies, industrial enterprises, technology companies, media, electronic and telecommunications companies, and the defense industry.
The modified firmware allows attackers to hide configuration changes and the history of executed commands. In addition, they can disable the logging system on a compromised device during malicious actions.
Specifically, for Cisco routers, researchers observed how attackers enabled and disabled the SSH backdoor using specially crafted TCP or UDP packets directed to the devices. This method allows attackers to remain undetected and enable the backdoor only when necessary.
It was also noticed that attackers made corrections to the memory of Cisco devices to bypass the signature verification functions of Cisco ROM Monitor. This allows attackers to download modified firmware that has previously installed backdoors that allow unregistered access to the device.
If Cisco routers are compromised, hackers also change the EEM policies used to automate tasks, removing certain lines from legitimate commands to block their execution and make it more difficult for forensic analysis.
According to the warning, BlackTech hackers use specialized and regularly updated malware to create backdoors in network devices. These backdoors are used for permanent access, initial network entry, and data interception.
Special attention should be paid to the fact that malware is sometimes signed with stolen certificates, which makes it difficult for security systems to detect it.
The report also contains security recommendations: monitoring unauthorized downloads of bootloader images and firmware, as well as unusual device reboots. It is also recommended to pay attention to SSH traffic on the router and apply a number of other security measures.
It is important to note that attacks on network devices have become more frequent over the past year. According to research, Chinese hackers are also targeting Fortinet, TP-Link, and SonicWall devices.