Since the Snowden leaks Surveillance Program by Government Officials Why dose it took 2 years to figure it out that Juniper’s is Backdoor by NSA Surveillance Program? Because they were giving NSA the time to Deploy the new Technology Surveillance Backdoor.
Surveillance and Backdoors have been an important and trending topic over few years and issue got more Promoting over Terrorists attack over the world.
But despite all the attention focused on backdoors lately, no one noticed that someone had quietly install backdoors three years ago in a core piece of networking equipment used to protect corporate and government systems around the globe.
Few days before Juniper Networking tech Revealed the “unauthorized” code found in there Operating system running on some of it’s firewalls.
What They Say’s?
“Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections,” Worrall said.
How Backdoor Appear?
This is because of system software vulnerabilities allowing anyone to decrypt VPN traffic and leave no trace of their actions, and allow anyone to complete compromise a device via SSH or telnet vulnerability.
“If the VPN backdoor doesn’t require you to use the other remote-access [password] backdoor first,” then it would be possible to decrypt historical traffic that had been captured, he says. “But I can imagine designing a backdoor in which I have to log into the box using the remote-access backdoor in order to enable the backdoor that lets me decrypt intercepted traffic.”