The J-magic Campaign was active from mid-2023 to at least mid-2024 and featured the use of the J-magic backdoor, a custom cd00r variant tailored for use against Juniper routers. The J-magic Campaign targeted Junos OS routers serving as VPN gateways primarily in the semiconductor, energy, manufacturing, and IT sectors. [1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .003 | Acquire Infrastructure: Virtual Private Server |
During the J-magic Campaign, threat actors acquired VPS for use in C2.[1] |
Enterprise | T1587 | .003 | Develop Capabilities: Digital Certificates |
During the J-magic Campaign, threat actors used self-signed certificates on VPS C2 infrastructure.[1] |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
During the J-magic Campaign, threat actors used the name "JunoscriptService" to masquerade malware as the Junos automation scripting service.[1] |
Enterprise | T1588 | .001 | Obtain Capabilities: Malware |
During the J-magic Campaign campaign, threat actors used open-source malware post-compromise including a custom variant of the cd00r backdoor.[1] |