Smart Teams Up With Chinas Leading Ai Firm Deeprouteai
Smart, a European-Chinese automaker co-owned by Mercedes and Geely, has sealed a strategic …
24. January 2025
Backdoor Malware Exploits “Magic Packets” for Stealthy VPN Infiltration
Researchers at Lumin Technology’s Black Lotus Lab have discovered a sophisticated backdoor malware that has been quietly infiltrating dozens of enterprise Virtual Private Networks (VPNs) running Juniper Network’s Junos OS. The malicious software, dubbed J-Magic, uses a novel technique known as “magic packets” to evade detection and remain dormant until it receives a specific signal.
J-Magic works by deploying a lightweight passive agent that resides only in memory, making it challenging for defenders to detect. This agent quietly observes all TCP traffic sent to the device, analyzing incoming packets for specific sets of data that are unusual enough to blend in with normal traffic but rare enough to be distinguishable from benign traffic.
The key to J-Magic’s stealthy operation lies in its use of “magic packets,” which are hidden within the normal flow of TCP traffic. When a magic packet is received, the backdoor relays a challenge to the device that sent it, consisting of an encrypted string of text using the public portion of an RSA key. The initiating party must then respond with the corresponding plaintext, proving it has access to the secret key.
The combination of J-Magic’s passive agent and magic packet technique makes it a formidable foe for defenders. The discovery is notable as it marks one of the first instances of magic packet malware targeting Junos OS routers that serve as VPN gateways. Researchers have found J-Magic on VirusTotal and determined that it had run inside the networks of 36 organizations worldwide.
Despite extensive analysis, the origin of the backdoor remains unclear. However, its widespread presence highlights the ongoing threat posed by sophisticated malware like J-Magic. The discovery serves as a timely reminder of the importance of staying vigilant and adapting to new tactics used by adversaries in the evolving landscape of cyber threats.