An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.
The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall.
The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.
Juniper said last Thursday that it found during an internal audit two instances of unauthorized code in some versions of ScreenOS, which runs its NetScreen model of enterprise firewalls.
The password was published on Sunday by the security firm Rapid7, which had been analyzing ScreenOS.
Juniper released patches for the password issue and another problem, which could allow VPN traffic to be monitored and decrypted.
Administrators were advised to patch immediately, and Juniper's revelation has received wide attention in the security community. But that still doesn't mean every company has patched, which puts them at risk.
Attackers often quickly try to take advantage of security vulnerabilities after patches are issued in hope of catching out organizations that are slow to react.
Ullrich wrote that the honeypot saw "numerous" login attempts over SSH using the hard-coded password. The attackers also tried various usernames, such as "root," "admin" and "netscreen."
"Our honeypot doesn't emulate ScreenOS beyond the login banner, so we do not know what the attackers are up to, but some of the attacks appear to be 'manual' in that we do see the attacker trying different commands," Ullrich wrote.
One of the IP addresses listed as the source for some of probes was flagged as belonging to the network security company Qualys, possibly attempting to estimate how many systems remain unpatched.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.