Mirai botnet attacks Session Smart Router devices
Posted date 26/12/2024
On Wednesday December 11th, some users reported malicious activity on their Session Smart Network (SSN) platforms. These cases were related to a small detail, namely that they were using factory-set passwords.
To exploit this vulnerability, cybercriminals have developed a new variant of the Mirai malware, which searches Juniper Networks routers with this configuration, then gains access to the system, executes malicious code and performs a series of malicious activities, including DDoS attacks.
Juniper Networks has limited itself to urging users to follow security guidelines and recommendations such as not using factory credentials, checking logs for suspicious activity and keeping software up to date at all times.
References
-
17/12/2024supportportal.juniper.net
-
19/12/2024therecord.media
Etiquetas