An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven’t been patched to remove unauthorized spying code.

The SANS Internet Storm Center set up a honeypot — a term for a computer designed to lure attackers in order to study their techniques — that mimicked a vulnerable Juniper firewall.

The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.

To read this article in full or to leave a comment, please click here

Source: COMPUTER WORLD