Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoChinese Cyber Espionage Group UNC3886 Backdoored Juniper Routershackread.comexternal-linkmessage-square1fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkChinese Cyber Espionage Group UNC3886 Backdoored Juniper Routershackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
minus-squareOnomatopoeia@lemmy.cafelinkfedilinkEnglisharrow-up4·1 day agoBuried deep in the article: Hackers stole admin credentials for these devices. So, yea, you have the creds, you can modify the OS any way you want. It wasn’t because the devices were EOL (as implied in the beginning of the article), it’s because of poor credential management.
Buried deep in the article:
Hackers stole admin credentials for these devices.
So, yea, you have the creds, you can modify the OS any way you want.
It wasn’t because the devices were EOL (as implied in the beginning of the article), it’s because of poor credential management.