Company Details
juniper-networks
10,258
894,915
5112
juniper.net
0
JUN_6775708
In-progress


Juniper Networks Vendor Cyber Rating & Cyber Score
juniper.netJuniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world. Juniper Networks is headquartered in Sunnyvale, California, with over 9,000 employees in 50 countries and nearly $5 billion in revenue. Our customers include the top 100 global service providers and 30,000 enterprises, including the Global Fortune 100 as well as hundreds of federal, state and local government agencies and higher educational organizations. At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world needs network innovation to connect ideas and unleash our full potential. Juniper is taking a new approach to the network — one that is intelligent, agile, secure and open to any vendor and any network environment. To learn more about Juniper, our products, and our vision for the decade ahead, visit our site at https://www.juniper.net. Acquired by Hewlett Packard Enterprise in 2025.
Company Details
juniper-networks
10,258
894,915
5112
juniper.net
0
JUN_6775708
In-progress
Between 600 and 649

Juniper Networks Global Score (TPRM)XXXX

Description: Cybercriminals Shift Focus to Network Infrastructure as New Malware Strains Emerge Security researchers have uncovered a surge in attacks targeting network infrastructure, including routers, firewalls, and IoT devices, as threat actors pivot away from traditional endpoints. This trend, once dominated by nation-state actors, is now being exploited by financially motivated attackers for large-scale DDoS campaigns and cryptocurrency mining. On March 6, 2026, researchers identified two new malware strains CondiBot and Monaco designed to compromise Linux-based systems and network devices. CondiBot, a Mirai-derived botnet variant, infects devices across ARM, MIPS, and x86 architectures, disabling reboot functions and removing competing malware before launching DDoS attacks. It spreads via multiple download methods, including wget, curl, and TFTP, and connects to a command-and-control (C2) server for further instructions. Meanwhile, Monaco, written in Go, scans the internet for exposed SSH services, using brute-force attacks with common passwords to gain access. Once inside, it deploys Monero mining software, kills competing miners, and exfiltrates stolen credentials to its C2 infrastructure often hosted on Alibaba Cloud. The malware targets servers, routers, and Juniper networks, optimizing system performance to maximize cryptocurrency output. These campaigns reflect a broader shift in cyber threats, with attackers increasingly exploiting unpatched vulnerabilities and weak configurations in internet-facing systems like VPNs and gateways. Network devices pose a unique risk due to limited security monitoring, allowing attackers to maintain persistence, intercept traffic, and move laterally within compromised environments. The rise of CondiBot and Monaco underscores how cybercriminals are blending disruption with profit-driven tactics, making network infrastructure a critical attack vector.
Description: Juniper Networks Patches Critical PTX Series Router Vulnerability (CVE-2026-21902) Juniper Networks has released an out-of-cycle security bulletin addressing a critical vulnerability (CVE-2026-21902) in its PTX Series routers running Junos OS Evolved. The flaw, rated 9.8 (CVSS v3.1) and 9.3 (CVSS v4.0), allows unauthenticated, remote attackers to execute arbitrary code with root privileges, enabling full device takeover. The vulnerability stems from an incorrect permission assignment in the On-Box Anomaly Detection framework, a default-enabled service designed to monitor unusual network behavior. Due to the flaw, the framework is exposed over an externally accessible port, bypassing authentication requirements. Attackers can exploit this to gain unrestricted control, potentially intercepting traffic, altering configurations, or launching further attacks. Affected Systems: - Junos OS Evolved (PTX Series only) - Versions: 25.4R1-EVO to 25.4R1-S1-EVO (before 25.4R1-S1-EVO) and 25.4R2-EVO - Unaffected: Junos OS Evolved versions before 25.4R1-EVO and standard Junos OS Juniper discovered the issue during internal testing, with no evidence of active exploitation reported. However, due to its severity, immediate action is recommended. Mitigation: - Patch: Upgrade to 25.4R1-S1-EVO, 25.4R2-EVO, 26.2R1-EVO, or later. - Workarounds: - Restrict access via firewall filters/ACLs (allowing only trusted networks). - Disable the vulnerable service using the CLI command: `request pfe anomalies disable`. The flaw highlights risks in core network infrastructure, particularly when default services expose critical attack surfaces. Administrators are urged to prioritize updates to prevent potential compromise.
Description: Mandiant researchers discovered custom backdoors deployed by China-linked espionage group UNC3886 on outdated Juniper Networks Junos OS routers. These TINYSHELL-based backdoors aimed for long-term persistence and stealth, targeting internal networking infrastructure and ISP routers. The backdoors imitated legitimate binaries and bypassed Junos OS security mechanisms, which could potentially lead to privileged access abuse, network authentication service compromises, and further covert operations within affected systems. The incident highlights significant vulnerabilities within critical networking devices and represents a strategic threat to the defense, technology, and telecommunications sectors.
Description: Cybersecurity Roundup: Major Breaches, State-Backed Threats, and Critical Vulnerabilities A wave of high-profile cyber incidents, state-sponsored attacks, and critical vulnerabilities has dominated recent cybersecurity news. Law Enforcement Actions & Espionage Spanish police arrested a young hacker for exploiting a payment gateway to book luxury hotel stays for just one cent. Meanwhile, a former U.S. defense contractor executive received an 87-month prison sentence for selling stolen trade secrets, including zero-day exploits, to a Russian broker. In a separate case, a Romanian national pleaded guilty to selling unauthorized access to Oregon state government networks and other U.S. victims. State-Backed Threats & APT Activity Google’s Threat Intelligence Group (GTIG) disrupted a China-linked APT, UNC2814, halting attacks on 53 organizations across 42 countries. The Lazarus Group, a North Korean APT, deployed Medusa ransomware against a Middle East target, while APT28 (Russia) launched Operation MacroMaze, exploiting webhooks for covert data exfiltration. Dutch intelligence warned of Russia escalating hybrid attacks, preparing for a prolonged standoff with Western nations. Critical Vulnerabilities & Exploits The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple flaws to its Known Exploited Vulnerabilities (KEV) catalog, including: - A Soliton Systems K.K FileZen vulnerability. - Cisco SD-WAN flaws, abused since 2023 for full admin control. - BeyondTrust (CVE-2026-1731) and VMware Aria Operations vulnerabilities enabling remote attacks. Juniper issued an emergency patch for a critical PTX router RCE flaw, while Check Point researchers exposed flaws in Claude Code that could turn untrusted repositories into attack vectors. Ransomware & Data Breaches - Everest ransomware hit Vikor Scientific’s supplier, stealing data of 140,000 patients. - ShinyHunters breached CarGurus, exposing 12.4 million users. - ManoMano, a European DIY chain, suffered a breach impacting 38 million customers. - Canadian Tire disclosed a 2025 breach affecting 38 million users. - Olympique Marseille confirmed an attempted cyberattack following a data leak. Emerging Threats & AI Risks - 12 million exposed .env files revealed widespread security misconfigurations. - Aeternum, a new botnet, hides commands in Polygon smart contracts. - An AI-powered campaign compromised 600 FortiGate systems globally. - Arkanix Stealer, an AI-assisted info-stealer, briefly operated before shutting down. - CrowdStrike reported attackers moving through networks in under 30 minutes. Geopolitical & Industry Developments - Apple’s iPhone and iPad became the first consumer devices cleared for NATO ‘RESTRICTED’ classification. - The U.S. Treasury sanctioned an exploit broker network for theft and sale of government cyber tools. - Iran’s internet faced near-total blackouts amid U.S. and Israeli strikes. - Ukraine reported cyberattacks on its energy grid being used to guide missile strikes. Malware & Campaigns - UAT-10027, a stealthy campaign, targeted U.S. education and healthcare with the Dohdoor backdoor. - Starkiller, a phishing service, proxies real login pages, including MFA. - North Korean actors deployed Medusa ransomware in a Middle East attack. - A wormable XMRig campaign used BYOVD (Bring Your Own Vulnerable Driver) and a timed kill switch for stealth. The past week underscored the growing sophistication of cyber threats, from state-sponsored espionage to AI-driven attacks and large-scale data breaches.
Description: On December 11, 2024, Juniper Networks identified a security breach where multiple customers' Session Smart Router (SSR) products running default passwords were compromised. The attackers leveraged the devices to conduct Distributed Denial-of-Service (DDoS) attacks as part of the Mirai botnet's activity. This security event resulted in unusual network behavior, including port scanning, failed SSH logins, spikes in traffic, and connections from known malicious IP addresses. Juniper Networks has issued recommendations to customers for strengthening security practices and mitigating future risks. This incident underscores the importance of strong password policies and regular security monitoring to prevent exploitation of network devices. No data leaks or critical threats to personal, financial, or regional economic security were reported.
Description: In mid-2024, China-linked cyber espionage group UNC3886 targeted outdated Juniper Networks Junos OS MX routers with custom backdoors. The deployment of TINYSHELL-based backdoors, which allowed for stealthy, persistent access, showed a sophisticated understanding of system internals and posed a significant threat. This attack rendered the organization vulnerable to long-term espionage activities, primarily affecting the defense, technology, and telecommunications sectors in the US and Asia. The security incident not only undermined the integrity of Juniper Networks' devices but also put sensitive customer and employee data at risk.


Juniper Networks has 66.67% more incidents than the average of same-industry companies with at least one recorded incident.
Juniper Networks has 70.94% more incidents than the average of all companies with at least one recorded incident.
Juniper Networks reported 2 incidents this year: 1 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Juniper Networks cyber incidents detection timeline including parent company and subsidiaries

Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world. Juniper Networks is headquartered in Sunnyvale, California, with over 9,000 employees in 50 countries and nearly $5 billion in revenue. Our customers include the top 100 global service providers and 30,000 enterprises, including the Global Fortune 100 as well as hundreds of federal, state and local government agencies and higher educational organizations. At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world needs network innovation to connect ideas and unleash our full potential. Juniper is taking a new approach to the network — one that is intelligent, agile, secure and open to any vendor and any network environment. To learn more about Juniper, our products, and our vision for the decade ahead, visit our site at https://www.juniper.net. Acquired by Hewlett Packard Enterprise in 2025.


With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform
JD.com, also known as JINGDONG, is a leading e-commerce company transferring to be a technology and service enterprise with supply chain at its core. JD.com’s business has expanded across retail, technology, logistics, health, property development, industrials, and international business. Ranking 44

Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite their siloed data, easily discover and securely share governed data, and execute diverse analy
Shopify is a leading global commerce company, providing trusted tools to start, grow, market, and manage a retail business of any size. Shopify makes commerce better for everyone with a platform and services that are engineered for reliability, while delivering a better shopping experience for consu

Cox Automotive is the world’s largest automotive services and technology provider. Fueled by the largest breadth of first-party data fed by 2.3 billion online interactions a year, Cox Automotive tailors leading solutions for car shoppers, auto manufacturers, dealers, lenders and fleets. The company
Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right person at the right mo
At Bolt, we're building a future where people don’t need to own personal cars to move around safely and conveniently. A future where people have the freedom to use transport on demand, choosing whatever vehicle's best for each occasion — be it a car, scooter, or e-bike. We're helping over 200 mill
Broadcom's VMware software manages cloud complexity so customers can modernize infrastructure, accelerate app development, and protect workloads, wherever these reside. Our flagship cloud solutions provide the security and performance of private cloud combined with the scale and agility of public c
.png)
HPE showcased its expanded secure networking portfolio with new Juniper‑powered SRX400 firewalls and AI security enhancements,...
The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or redirect data,...
This vulnerability allows unauthenticated attackers on the network to execute malicious code with root privileges, enabling full device...
Discover Juniper Networks' complete list of acquisitions with year-wise trends, sector-wise breakdowns, geographic insights, and related M&A...
U.S. bolsters cybersecurity via DoW's Cyber Force Generation Plan while corporate mergers like HPE-Juniper build domestic networking...
In what should be a surprise to few, networking heavyweights Hewlett Packard Enterprise (HPE), Juniper Networks, and Cisco dominated the...
Cisco is the world's largest networking vendor, but that has not stopped its executive team from poking down at its smaller rivals, with CFO...
In 2023, Juniper Networks generated 5.56 billion US dollars in revenue. This was an increase on the previous year, and the highest revenue figure reported...
Juniper Networks has patched nearly 220 vulnerabilities in Junos OS, Junos Space, and Security Director products.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Juniper Networks is http://www.juniper.net.
According to Rankiteo, Juniper Networks’s AI-generated cybersecurity score is 644, reflecting their Poor security posture.
According to Rankiteo, Juniper Networks currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Juniper Networks has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Juniper Networks is not certified under SOC 2 Type 1.
According to Rankiteo, Juniper Networks does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Juniper Networks is not listed as GDPR compliant.
According to Rankiteo, Juniper Networks does not currently maintain PCI DSS compliance.
According to Rankiteo, Juniper Networks is not compliant with HIPAA regulations.
According to Rankiteo,Juniper Networks is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Juniper Networks operates primarily in the Software Development industry.
Juniper Networks employs approximately 10,258 people worldwide.
Juniper Networks presently has no subsidiaries across any sectors.
Juniper Networks’s official LinkedIn profile has approximately 894,915 followers.
Juniper Networks is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Juniper Networks does not have a profile on Crunchbase.
Yes, Juniper Networks maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/juniper-networks.
As of April 02, 2026, Rankiteo reports that Juniper Networks has experienced 6 cybersecurity incidents.
Juniper Networks has an estimated 29,309 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Vulnerability and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with strengthening security practices, remediation measures with mitigating future risks, and communication strategy with issued recommendations to customers, and enhanced monitoring with regular security monitoring, and containment measures with upgrade to patched versions (25.4r1-s1-evo, 25.4r2-evo, 26.2r1-evo, or later), restrict access via firewall filters/acls, disable vulnerable service using cli command, and remediation measures with patch deployment, firewall configuration, service disablement, and third party assistance with google’s threat intelligence group (gtig), and law enforcement notified with spanish police, law enforcement notified with u.s. law enforcement, and remediation measures with emergency patch for juniper ptx router, remediation measures with disruption of unc2814 attacks..
Title: Juniper Networks SSR Compromise
Description: On December 11, 2024, Juniper Networks identified a security breach where multiple customers' Session Smart Router (SSR) products running default passwords were compromised. The attackers leveraged the devices to conduct Distributed Denial-of-Service (DDoS) attacks as part of the Mirai botnet's activity. This security event resulted in unusual network behavior, including port scanning, failed SSH logins, spikes in traffic, and connections from known malicious IP addresses. Juniper Networks has issued recommendations to customers for strengthening security practices and mitigating future risks. This incident underscores the importance of strong password policies and regular security monitoring to prevent exploitation of network devices. No data leaks or critical threats to personal, financial, or regional economic security were reported.
Date Detected: 2024-12-11
Type: DDoS Attack
Attack Vector: Default Passwords
Vulnerability Exploited: Weak Password Policies
Threat Actor: Mirai Botnet
Motivation: Conduct DDoS Attacks
Title: UNC3886 Attack on Juniper Networks Junos OS Routers
Description: Mandiant researchers discovered custom backdoors deployed by China-linked espionage group UNC3886 on outdated Juniper Networks Junos OS routers. These TINYSHELL-based backdoors aimed for long-term persistence and stealth, targeting internal networking infrastructure and ISP routers. The backdoors imitated legitimate binaries and bypassed Junos OS security mechanisms, which could potentially lead to privileged access abuse, network authentication service compromises, and further covert operations within affected systems. The incident highlights significant vulnerabilities within critical networking devices and represents a strategic threat to the defense, technology, and telecommunications sectors.
Type: Espionage
Attack Vector: Custom Backdoors
Vulnerability Exploited: Outdated Junos OS routers
Threat Actor: UNC3886
Motivation: Long-term persistence and stealth
Title: UNC3886 Targets Juniper Networks Routers with Custom Backdoors
Description: China-linked cyber espionage group UNC3886 targeted outdated Juniper Networks Junos OS MX routers with custom backdoors. The deployment of TINYSHELL-based backdoors, which allowed for stealthy, persistent access, showed a sophisticated understanding of system internals and posed a significant threat. This attack rendered the organization vulnerable to long-term espionage activities, primarily affecting the defense, technology, and telecommunications sectors in the US and Asia. The security incident not only undermined the integrity of Juniper Networks' devices but also put sensitive customer and employee data at risk.
Date Detected: mid-2024
Type: Cyber Espionage
Attack Vector: Custom Backdoors
Vulnerability Exploited: Outdated Juniper Networks Junos OS MX routers
Threat Actor: UNC3886
Motivation: Espionage
Title: Juniper Networks Patches Critical PTX Series Router Vulnerability (CVE-2026-21902)
Description: Juniper Networks has released an out-of-cycle security bulletin addressing a critical vulnerability (CVE-2026-21902) in its PTX Series routers running Junos OS Evolved. The flaw allows unauthenticated, remote attackers to execute arbitrary code with root privileges, enabling full device takeover. The vulnerability stems from an incorrect permission assignment in the On-Box Anomaly Detection framework, which is exposed over an externally accessible port, bypassing authentication requirements.
Type: Vulnerability Exploitation
Attack Vector: Remote
Vulnerability Exploited: CVE-2026-21902
Title: Cybersecurity Roundup: Major Breaches, State-Backed Threats, and Critical Vulnerabilities
Description: A wave of high-profile cyber incidents, state-sponsored attacks, and critical vulnerabilities has dominated recent cybersecurity news, including law enforcement actions, state-backed threats, ransomware attacks, data breaches, and emerging AI-driven threats.
Type: APT Activity
Attack Vector: Exploited VulnerabilitiesPhishingZero-Day ExploitsWebhooks ExploitationAI-Powered AttacksSupply Chain Attack
Vulnerability Exploited: Soliton Systems K.K FileZenCisco SD-WAN flawsBeyondTrust (CVE-2026-1731)VMware Aria OperationsJuniper PTX router RCE flawClaude Code flaws
Threat Actor: UNC2814 (China)Lazarus Group (North Korea)APT28 (Russia)ShinyHuntersEverest RansomwareAeternum BotnetArkanix Stealer
Motivation: Financial GainEspionageData TheftSabotageGeopolitical
Title: Cybercriminals Shift Focus to Network Infrastructure as New Malware Strains Emerge
Description: Security researchers have uncovered a surge in attacks targeting network infrastructure, including routers, firewalls, and IoT devices, as threat actors pivot away from traditional endpoints. Two new malware strains, CondiBot and Monaco, were identified on March 6, 2026. CondiBot, a Mirai-derived botnet variant, infects devices across ARM, MIPS, and x86 architectures, disabling reboot functions and removing competing malware before launching DDoS attacks. Monaco, written in Go, scans for exposed SSH services, uses brute-force attacks to gain access, deploys Monero mining software, and exfiltrates stolen credentials to its C2 infrastructure. These campaigns reflect a broader shift in cyber threats, exploiting unpatched vulnerabilities and weak configurations in internet-facing systems.
Date Detected: 2026-03-06
Date Publicly Disclosed: 2026-03-06
Type: Malware
Attack Vector: Brute-force attacksExploiting unpatched vulnerabilitiesWeak configurations
Vulnerability Exploited: Exposed SSH servicesUnpatched network devices
Threat Actor: Financially motivated attackersCybercriminals
Motivation: Financial gainDisruption
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Default Passwords, Outdated Juniper Networks Junos OS routers, Outdated Juniper Networks Junos OS MX routers and Exposed SSH services.

Systems Affected: Session Smart Router (SSR) products
Operational Impact: Unusual network behaviorPort scanningFailed SSH loginsSpikes in trafficConnections from known malicious IP addresses

Systems Affected: Juniper Networks Junos OS routers
Operational Impact: Privileged access abuseNetwork authentication service compromisesCovert operations

Data Compromised: Customer data, Employee data
Systems Affected: Juniper Networks Junos OS MX routers
Brand Reputation Impact: Significant

Systems Affected: PTX Series routers running Junos OS Evolved
Operational Impact: Full device takeover, potential traffic interception, configuration alteration, or further attacks

Data Compromised: 140,000 patients (vikor scientific supplier), 12.4 million users (cargurus), 38 million customers (manomano), 38 million users (canadian tire)
Systems Affected: Payment gatewaysGovernment networksHealthcare systemsE-commerce platformsEnergy gridsNATO-classified devices
Operational Impact: Disrupted servicesData exfiltrationNetwork compromise
Brand Reputation Impact: Olympique MarseilleCanadian TireManoMano
Identity Theft Risk: ['140,000 patients', '12.4 million users', '38 million customers']

Data Compromised: Stolen credentials
Systems Affected: RoutersFirewallsIoT devicesLinux-based systemsJuniper networksVPNsGateways
Operational Impact: Lateral movement within compromised environmentsTraffic interceptionPersistence in networks
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Data, Employee Data, , Patient Data, User Data, Customer Data, Trade Secrets, Government Network Access, , Credentials and .

Entity Name: Juniper Networks
Entity Type: Company
Industry: Networking and Cybersecurity

Entity Name: Juniper Networks
Entity Type: Company
Industry: Technology

Entity Name: Juniper Networks
Entity Type: Organization
Industry: Defense, Technology, Telecommunications
Location: USAsia

Entity Name: Juniper Networks
Entity Type: Technology Company
Industry: Networking and Cybersecurity

Entity Name: Vikor Scientific’s supplier
Entity Type: Healthcare Supplier
Industry: Healthcare
Customers Affected: 140,000 patients

Entity Name: CarGurus
Entity Type: E-commerce
Industry: Automotive
Customers Affected: 12.4 million users

Entity Name: ManoMano
Entity Type: E-commerce
Industry: Retail (DIY)
Location: Europe
Customers Affected: 38 million customers

Entity Name: Canadian Tire
Entity Type: Retail
Industry: Retail
Location: Canada
Customers Affected: 38 million users

Entity Name: Olympique Marseille
Entity Type: Sports Organization
Industry: Sports
Location: France

Entity Name: U.S. Defense Contractor
Entity Type: Government Contractor
Industry: Defense
Location: U.S.

Entity Name: Oregon State Government
Entity Type: Government
Industry: Public Sector
Location: U.S.

Entity Name: 53 Organizations (UNC2814 Targets)
Entity Type: Various
Industry: Multiple
Location: 42 countries

Entity Type: Network infrastructure providers, Enterprises with exposed SSH services

Remediation Measures: Strengthening security practicesMitigating future risks
Communication Strategy: Issued recommendations to customers
Enhanced Monitoring: Regular security monitoring

Containment Measures: Upgrade to patched versions (25.4R1-S1-EVO, 25.4R2-EVO, 26.2R1-EVO, or later), restrict access via firewall filters/ACLs, disable vulnerable service using CLI command
Remediation Measures: Patch deployment, firewall configuration, service disablement

Third Party Assistance: Google’S Threat Intelligence Group (Gtig).
Law Enforcement Notified: Spanish Police, U.S. Law Enforcement,
Remediation Measures: Emergency patch for Juniper PTX routerDisruption of UNC2814 attacks
Third-Party Assistance: The company involves third-party assistance in incident response through Google’s Threat Intelligence Group (GTIG), .

Type of Data Compromised: Customer data, Employee data
Sensitivity of Data: High

Type of Data Compromised: Patient data, User data, Customer data, Trade secrets, Government network access
Number of Records Exposed: 140,000, 12.4 million, 38 million, 38 million
Sensitivity of Data: HighMedium
Data Exfiltration: Yes
Data Encryption: ['Yes (Ransomware)']
File Types Exposed: .env files
Personally Identifiable Information: Yes

Type of Data Compromised: Credentials
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Strengthening security practices, Mitigating future risks, , Patch deployment, firewall configuration, service disablement, Emergency patch for Juniper PTX router, Disruption of UNC2814 attacks, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by upgrade to patched versions (25.4r1-s1-evo, 25.4r2-evo, 26.2r1-evo, or later), restrict access via firewall filters/acls and disable vulnerable service using cli command.

Ransomware Strain: MedusaEverest
Data Encryption: ['Yes']
Data Exfiltration: ['Yes']

Legal Actions: 87-month prison sentence (U.S. defense contractor executive), Guilty plea (Romanian national),
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through 87-month prison sentence (U.S. defense contractor executive), Guilty plea (Romanian national), .

Lessons Learned: Importance of strong password policies, Regular security monitoring

Lessons Learned: Highlights risks in core network infrastructure when default services expose critical attack surfaces

Recommendations: Strengthening security practices, Mitigating future risksStrengthening security practices, Mitigating future risks

Recommendations: Prioritize updates to prevent potential compromise, restrict access to trusted networks, disable vulnerable services if patching is not immediately possible
Key Lessons Learned: The key lessons learned from past incidents are Importance of strong password policies,Regular security monitoringHighlights risks in core network infrastructure when default services expose critical attack surfaces.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Prioritize updates to prevent potential compromise, restrict access to trusted networks and disable vulnerable services if patching is not immediately possible.

Source: Mandiant Research

Source: Juniper Networks Security Bulletin

Source: Google’s Threat Intelligence Group (GTIG)

Source: CISA Known Exploited Vulnerabilities (KEV) Catalog

Source: Check Point Research

Source: CrowdStrike

Source: Security researchers
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Mandiant Research, and Source: Juniper Networks Security Bulletin, and Source: Google’s Threat Intelligence Group (GTIG), and Source: CISA Known Exploited Vulnerabilities (KEV) Catalog, and Source: Check Point Research, and Source: CrowdStrike, and Source: Security researchers.

Investigation Status: Vulnerability patched, no evidence of active exploitation reported
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Issued Recommendations To Customers.

Customer Advisories: Issued recommendations to customers
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Issued Recommendations To Customers and .

Entry Point: Default Passwords

Entry Point: Outdated Juniper Networks Junos OS routers
Backdoors Established: TINYSHELL-based backdoors
High Value Targets: Internal Networking Infrastructure, Isp Routers,
Data Sold on Dark Web: Internal Networking Infrastructure, Isp Routers,

Entry Point: Outdated Juniper Networks Junos OS MX routers
Backdoors Established: ['TINYSHELL-based backdoors']
High Value Targets: Defense, Technology, Telecommunications,
Data Sold on Dark Web: Defense, Technology, Telecommunications,

Entry Point: Exposed Ssh Services,

Root Causes: Weak Password Policies,
Corrective Actions: Strengthening Security Practices, Regular Security Monitoring,

Root Causes: Outdated Junos Os Routers,

Root Causes: Outdated Juniper Networks Junos OS MX routers

Root Causes: Incorrect permission assignment in the On-Box Anomaly Detection framework, exposure over externally accessible port
Corrective Actions: Patch deployment, firewall configuration, service disablement

Root Causes: Unpatched Vulnerabilities, Weak Configurations, Exposed Internet-Facing Systems,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Regular Security Monitoring, , Google’S Threat Intelligence Group (Gtig), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Strengthening Security Practices, Regular Security Monitoring, , Patch deployment, firewall configuration, service disablement.
Last Attacking Group: The attacking group in the last incident were an Mirai Botnet, UNC3886, UNC3886, UNC2814 (China)Lazarus Group (North Korea)APT28 (Russia)ShinyHuntersEverest RansomwareAeternum BotnetArkanix Stealer and Financially motivated attackersCybercriminals.
Most Recent Incident Detected: The most recent incident detected was on 2024-12-11.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2026-03-06.
Most Significant Data Compromised: The most significant data compromised in an incident were Customer Data, Employee Data, , 140,000 patients (Vikor Scientific supplier), 12.4 million users (CarGurus), 38 million customers (ManoMano), 38 million users (Canadian Tire), , Stolen credentials and .
Most Significant System Affected: The most significant system affected in an incident was Session Smart Router (SSR) products and Juniper Networks Junos OS routers and Juniper Networks Junos OS MX routers and and Payment gatewaysGovernment networksHealthcare systemsE-commerce platformsEnergy gridsNATO-classified devices and RoutersFirewallsIoT devicesLinux-based systemsJuniper networksVPNsGateways.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was google’s threat intelligence group (gtig), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Upgrade to patched versions (25.4R1-S1-EVO, 25.4R2-EVO, 26.2R1-EVO, or later), restrict access via firewall filters/ACLs and disable vulnerable service using CLI command.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Employee Data, Stolen credentials, 12.4 million users (CarGurus), Customer Data, 38 million users (Canadian Tire), 140,000 patients (Vikor Scientific supplier) and 38 million customers (ManoMano).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 88.5M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was 87-month prison sentence (U.S. defense contractor executive), Guilty plea (Romanian national), .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Regular security monitoring, Highlights risks in core network infrastructure when default services expose critical attack surfaces.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Mitigating future risks, Strengthening security practices, Prioritize updates to prevent potential compromise, restrict access to trusted networks and disable vulnerable services if patching is not immediately possible.
Most Recent Source: The most recent source of information about an incident are Mandiant Research, Security researchers, CrowdStrike, Juniper Networks Security Bulletin, Check Point Research, CISA Known Exploited Vulnerabilities (KEV) Catalog and Google’s Threat Intelligence Group (GTIG).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Vulnerability patched, no evidence of active exploitation reported.
Most Recent Customer Advisory: The most recent customer advisory issued was an Issued recommendations to customers.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Outdated Juniper Networks Junos OS routers, Outdated Juniper Networks Junos OS MX routers and Default Passwords.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Weak Password Policies, Outdated Junos OS routers, Outdated Juniper Networks Junos OS MX routers, Incorrect permission assignment in the On-Box Anomaly Detection framework, exposure over externally accessible port, Unpatched vulnerabilitiesWeak configurationsExposed internet-facing systems.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Strengthening security practicesRegular security monitoring, Patch deployment, firewall configuration, service disablement.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.