
Given the severity of this issue, we decided to investigate.” ( src)ĭid the CEO know of this or not? Was it an secret NSA-spy-coder or a official NSA-request? “Shortly after Juniper posted the advisory, an employee of Fox-IT stated that they were able to identify the backdoor password in six hours.Ī quick Shodan search identified approximately 26,000 internet-facing Netscreen devices with SSH open. The catalog states that FEEDTROUGH “has been deployed on many target platforms.” ” ( src) In this way, US government spies can secure themselves a permanent presence in computer networks. Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.” This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. “In the case of Juniper, the name of this particular digital lock pick is “ FEEDTROUGH.” Juniper also affected and you can expect LEVE元 and NetGear to be “willingly or unwillingly” in “the backdoor game” too (don’t know about TP-LINK they may contain Chinese backdoors X-D)


While the hardware costs of a laptop maybe 300-1500€/USD – the data and VPN stuff on it might be way more valuable – because it could lead to your company being hacked – with downtime of your IT-infrastructure and thus way more costs. IT IS F**** DANGEROUS! ESPECIALLY if it is enabled per default and ESPECIALLY if it automatically tries to connect to some command and control server center out in the internet. While “backdoors” in hardware sound like a good idea… you don’t know how hackers are using it to sabotage infrastructure or extort bitcoins of another country’s companies… see “ backdoor in cisco router“.

