Cisco Devices Hacked with Evading Backdoor Implant and Zero-Day Exploits

TL;DR Summary
The backdoor implant on hacked Cisco devices, which exploited zero-day flaws in IOS XE software, has been modified by the threat actor to evade detection. The implant now only responds if the correct Authorization HTTP header is set, making it harder to detect. Cisco has started rolling out security updates to address the issues, but the exact identity of the threat actor is unknown. The number of compromised devices has decreased from 40,000 to a few hundred, possibly due to under-the-hood changes. Over 37,000 devices are still observed to be compromised.
Topics:business#backdoor-implant#cisco#cyber-threat-vulnerability#network-security#threat-actor#zero-day-flaws
- Backdoor Implant on Hacked Cisco Devices Modified to Evade Detection The Hacker News
- Cisco warns of a second IOS XE zero-day used to infect devices worldwide Security Affairs
- Group Behind Cisco Device Hijackings Changes Tactics to Evade Detection PCMag
- Norway issues warning after 'important businesses' affected by Cisco zero-days The Record from Recorded Future News
- Cisco patches IOS XE zero-days used to hack over 50,000 devices BleepingComputer
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
1 min
vs 2 min read
Condensed
76%
377 → 91 words
Want the full story? Read the original article
Read on The Hacker News