HomeVulnerabilityNo proof that TP-Hyperlink routers are a Chinese language security menace

No proof that TP-Hyperlink routers are a Chinese language security menace

One analysis report cited by O’Rielly got here from Test Level, which found {that a} Chinese language state-sponsored APT group it tracks as Camaro Dragon implanted a malicious backdoor referred to as Horse Shell that was tailor-made for TP-Hyperlink routers. Test Level notes that Horse Shell “is a binary compiled for MIPS32 MSB working system and written in C++. Many embedded gadgets and routers run MIPS-based working programs, and TP-Hyperlink routers aren’t any completely different.”

Malware might have simply as simply been planted on different manufacturers’ tools

The writer of that report, Itay Cohen, analysis lead at Test Level, tells CSO that the Chinese language menace group might have simply as simply implanted the malware on routers from US-based Cisco, that are manufactured in Korea, China, Taiwan, Malaysia, and Singapore, or US-based Netgear, which outsources its router manufacturing to electronics firms in different international locations, together with China or Taiwan.

“In lots of instances, the identical attackers are utilizing completely different router distributors,” Cohen says. “There’s a likelihood that within the assault we analyzed, extra router distributors have been contaminated within the chain. Despite the fact that we discovered it for TP-Hyperlink-specific variations, the code was not written particularly for TP-Hyperlink. It was generic sufficient that it theoretically might have been written as a framework that the attackers deploy on different routers or different distributors.”

See also  Is your cloud security technique prepared for LLMs?
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular