Attackers are hunting for tampered Juniper firewalls

An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven’t been patched to remove unauthorized spying code.

The SANS Internet Storm Center set up a honeypot — a term for a computer designed to lure attackers in order to study their techniques — that mimicked a vulnerable Juniper firewall.

The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.

To read this article in full or to leave a comment, please click here

Read more: Attackers are hunting for tampered Juniper firewalls

Story added 22. December 2015, content source with full text you can find at link above.