|
|
|
|
|
|
|
|
|
|
|
Subscribe to Bloggers speak out on BradReese.Com Top Secret National Security Agency (NSA) JETPLOW firmware persistence implant (backdoor) for Cisco firewalls Cisco officially acknowledges possible NSA backdoor security vulnerabilities:
Hummelstown, PA: Mon, 12/30/13 - 11:59pm View comments Update 3/13/2014: "No evidence of any procedural irregularities or tampering of the BIOS, operating system, or applications was revealed. As a result, Cisco PSIRT has now closed this investigation." Update 1/8/2014:
Cisco officially states it was not aware of JETPLOWIn a stunning development, Cisco has officially acknowledged for the very first time the real possibility of NSA backdoors implanted within Cisco networking devices as detailed in the newly released Cisco Product Security Incident Response Team (PSIRT) incident ID: Additionally, Cisco senior vice president and chief security officer, John Stewart, blogged: Cisco Product Security Incident Response Team (PSIRT) has opened an investigation "Customers can stay informed of the progress of this investigation via the previously posted Cisco Security Response about the alleged capabilities of the United States National Security Agency (NSA) Tailored Access Operations (TAO) organization. TAO 'exploits the technical weaknesses' of Information Technology products from numerous companies, and mentions Cisco. We are deeply concerned with anything that may impact the integrity of our products or our customers' networks and continue to seek additional information."
Top Secret National Security Agency (NSA) JETPLOW firmware persistence implant for Cisco PIX and Cisco ASA (Adaptive Security Appliance) firewalls that installs a permanent backdoor:Source: Spiegel Online
Top Secret National Security Agency (NSA) FEEDTROUGH is a persistence technique used against Juniper Netscreen firewalls:Source: Spiegel Online
Top Secret National Security Agency (NSA) SOUFFLETROUGH is a user BIOS persistence implant for Juniper SSG 500 and SSG 300 series firewalls:Source: Spiegel Online
Top Secret National Security Agency (NSA) GOURMETTROUGH is a user configurable persistence implant for certain Juniper firewalls:Source: Spiegel Online
Top Secret National Security Agency (NSA) HALLUXWATER persistence back door implant is installed on a target Huawei Eudemon firewall as a boot ROM upgrade:Source: Spiegel Online
Top Secret National Security Agency (NSA) STUCCOMONTANA is the cover term for the persistence technique to deploy a DNT implant to Juniper T-Series routers:Source: Spiegel Online
Top Secret National Security Agency (NSA) SIERRAMONTANA is the cover term for the persistence technique to deploy a DNT implant to Juniper M-Series routers:Source: Spiegel Online
Top Secret National Security Agency (NSA) SCHOOLMONTANA is the cover term for the persistence technique to deploy a DNT implant to Juniper J-Series routers:Source: Spiegel Online
Top Secret National Security Agency (NSA) HEADWATER is a Persistent Backdoor (PBD) software implant for selected Huawei routers:Source: Spiegel Online
Top Secret National Security Agency (NSA) NIGHTSTAND is an active 802.11 wireless exploitation and injection tool for payload/exploit delivery into otherwise denied target space. NIGHTSTAND is typically used in operations where wired access to the target is not possible:Source: Spiegel Online
Top Secret National Security Agency (NSA) SPARROW II is a fully functional WLAN collection system:Source: Spiegel Online Related resources: Spiegel Online: Interactive Graphic: The NSA's Spy Catalog Spiegel Online: NSA Secret Toolbox: ANT Unit Offers Spy Gadgets for Every Need SPIEGEL ONLINE - Catalog Reveals NSA Has Back Doors for Numerous Devices SPIEGEL ONLINE - The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks
Related stories: Top secret document contradicts Cisco's denial of NSA spy cooperation Rumor Cisco product development engineers penalized for reporting security issues Cisco spy issue could affect the war on global terrorism Is the National Security Agency (NSA) killing innovation at Cisco? ZTE's State of the Art Trusted Delivery Model
Is Cisco behind the U.S. Congressional attack on Huawei and ZTE?
Subscribe to Bloggers speak out on BradReese.Com
|
| |||
©2014 Alliance Networking LLC - Home - About - Repair - Power Supplies - Refurbished - Blog - Quick Links - Site Map - Contact Us |