Who were the attackers and how did they get in? The discovery of spying code nestled deeply in Juniper’s networking equipment, the latest example of a major IT vendor caught up in an damaging cyberattack, raises many questions. Juniper said Thursday that one of its firewall operating systems had been modified to allow secret access, posing a huge threat to companies and organizations using the equipment. Security experts wondered how the modifications could have been made years ago to some of Juniper’s most sensitive source code without it knowing until recently. Companies try to vigorously protect their source code, which is an IT company’s core intellectual property. But the fact that Juniper’s Chief Information Officer, Bob Worrell, came forward with the findings has been met with praise, although there is hope the company will soon provide greater detail. A Juniper spokeswoman said Sunday the company did not have more information to share. “I think Juniper did the right thing here,” said HD Moore, chief research officer for the security firm Rapid7, via email. “I suspect that this incident will trigger internal security audits across the industry and cause Juniper to drastically change their code review process.” Juniper’s approach with customers may reflect that taken by EMC’s RSA unit, wrote Alex Stamos, Facebook’s chief security officer. In March 2011, RSA revealed that hackers had stolen critical information about its one-time passcode product called SecurID. “I expect they are briefing big customers privately to control the sales damage, a la RSA after their incident,” Stamos wrote. Two major problems were found in Juniper’s NetScreen OS. One was a hard-coded password that could allow any attacker with a valid username to log into one of Juniper’s firewalls running its NetScreen OS using telnet or SSH. On Sunday, Moore wrote on Rapid7’s blog that his company had discovered that hard-coded password, which had been cleverly crafted to not look like a password. Since the password is now public, it poses a great risk to organizations that have not patched their Juniper devices. Moore wrote he found 26,000 Internet-facing NetScreen devices that have SSH available using Shodan, a specialized search engine for querying Internet-connected devices. The second vulnerability can allow VPN traffic to be monitored and decrypted. VPNs are encrypted connections between a user and another computer and are often used by companies to allow secure remote access to their systems for employees who are traveling. There are many questions that Juniper will face in the coming days, such as how the attackers were able to infiltrate so deeply into the company’s systems undetected and what it will do now to keep them out. Matt Blaze, an associate professor of computer and information science at the University of Pennsylvania, wrote on Twitter that Juniper should “keep details coming, for the sake of the community.” “I understand the natural corporate PR instinct is to shut up about something like this, but that’s not the right thing to do here,” Blaze wrote. Related content news IBM, Palo Alto marry to focus on AI-based security technology The expanded partnership includes the sale of IBM’s QRadar security intelligence platform to Palo Alto Networks. By Michael Cooney May 15, 2024 4 mins Communications Security Network Security news ZutaCore launches liquid cooling for advanced Nvidia chips The HyperCool direct-to-chip system from ZutaCore is designed to cool up to 120kW of rack power without requiring a facilities modification. By Andy Patrizio May 15, 2024 3 mins Servers Data Center news 2024 global network outage report and internet health check ThousandEyes tracks internet and cloud traffic and provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz May 15, 2024 45 mins Internet Service Providers Network Management Software Cloud Computing news Network jobs watch: Hiring, skills and certification trends What IT leaders need to know about expanding responsibilities, new titles and hot skills for network professionals and I&O teams. By Denise Dubie May 15, 2024 8 mins Careers Data Center Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe