Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoChinese Cyber Espionage Group UNC3886 Backdoored Juniper Routershackread.comexternal-linkmessage-square1linkfedilinkarrow-up112arrow-down11cross-posted to: [email protected]
arrow-up111arrow-down1external-linkChinese Cyber Espionage Group UNC3886 Backdoored Juniper Routershackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square1linkfedilinkcross-posted to: [email protected]
minus-squareOnomatopoeia@lemmy.cafelinkfedilinkEnglisharrow-up4·2 months agoBuried deep in the article: Hackers stole admin credentials for these devices. So, yea, you have the creds, you can modify the OS any way you want. It wasn’t because the devices were EOL (as implied in the beginning of the article), it’s because of poor credential management.
Buried deep in the article:
Hackers stole admin credentials for these devices.
So, yea, you have the creds, you can modify the OS any way you want.
It wasn’t because the devices were EOL (as implied in the beginning of the article), it’s because of poor credential management.