The J-Magic Show: Magic Packets and Where to find them

Jan. 24, 2025, 8:23 a.m.

Description

Black Lotus Labs has been tracking a backdoor attack targeting enterprise-grade Juniper routers. Dubbed J-magic, this campaign uses a passive agent that monitors for 'magic packets' in TCP traffic. Once activated, it establishes a reverse shell for device control and data theft. The campaign, active from mid-2023 to mid-2024, targeted semiconductors, energy, manufacturing, and IT sectors. The malware, a variant of cd00r, presents detection challenges and exploits routers' long uptime. Approximately 50% of targeted devices were configured as VPN gateways, potentially allowing access to organizations' networks. The campaign's use of open-source malware and specific targeting of JunoOS-based systems makes it a noteworthy threat to enterprise networks.

Date

  • Created: Jan. 23, 2025, 9:03 p.m.
  • Published: Jan. 23, 2025, 9:03 p.m.
  • Modified: Jan. 24, 2025, 8:23 a.m.

Indicators

  • c7cf51499973908cbc4c746f689b6ed245b26b1a9eae62fe9329f3a1036e82f4
  • 957c0c135b50d1c209840ec7ead60912a5ccefd2873bf5722cb85354cea4eb37
  • 5e3c128749f7ae4616a4620e0b53c0e5381724a790bba8314acb502ce7334df2
  • 3f26a13f023ad0dcd7f2aa4e7771bba74910ee227b4b36ff72edc5f07336f115

Attack Patterns

Additional Informations

  • Semiconductor
  • Technology
  • Energy
  • Telecommunications
  • Manufacturing
  • Venezuela, Bolivarian Republic of
  • Chile
  • Colombia
  • Armenia
  • Netherlands
  • Norway
  • Argentina
  • Peru
  • Indonesia
  • Brazil
  • United States of America
  • Russian Federation