The RedPenguin project was launched by Juniper in July 2024 to investigate reported malware infections of Juniper MX Series routers. RedPenguin activity was separately attributed to UNC3886 and included the deployment of multiple custom versions of the publicly-available TINYSHELL backdoor on Juniper routers.[1][2]
| ID | Name | Description |
|---|---|---|
| G1048 | UNC3886 |
In mid-2024 Mandiant identified custom TINYSHELL-based backdoors deployed on Juniper Networks’ Junos OS routers. Mandiant attributed these backdoors to the China-nexus espionage group UNC3886.[2] |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
During RedPenguin, UNC3886 used malware capable of launching an interactive shell.[2][1] |
| .008 | Command and Scripting Interpreter: Network Device CLI |
During RedPenguin, UNC3886 accessed the Junos OS CLI on targeted devices.[2][1] |
||
| Enterprise | T1554 | Compromise Host Software Binary |
During RedPenguin, UNC3886 peformed a local memory patching attack to modify the snmpd and mgd Junos OS daemons.[1] |
|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
During RedPenguin, UNC3886 used malware implants to deobfuscate incoming C2 messages and encoded archives.[2][1] |
|
| Enterprise | T1587 | .001 | Develop Capabilities: Malware |
During RedPenguin, UNC3886 deployed custom malware based on the publicly-available TINYSHELL backdoor.[2][3] |
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
During RedPenguin, UNC3886 malware used the RC4 cipher to encrypt outgoing C2 messages.[1] |
| Enterprise | T1041 | Exfiltration Over C2 Channel |
During RedPenguin, UNC3886 uploaded specified files from compromised devices to a remote server. [2] |
|
| Enterprise | T1203 | Exploitation for Client Execution |
During RedPenguin, UNC3886 exploited CVE-2025-21590 to bypass Veriexec protections in Junos OS designed to prevent unauthorized binary execution.[2][1] |
|
| Enterprise | T1562 | .003 | Impair Defenses: Impair Command History Logging |
During RedPenguin, UNC3886 used malware to clear the |
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
During RedPenguin, UNC3886 used malware capaple of removing scripts after execution.[2] |
| .007 | Indicator Removal: Clear Network Connection History and Configurations |
During RedPenguin, UNC3886 used an implant to delete logs associated with unauthorized access to targeted Junos OS devices.[1] |
||
| Enterprise | T1105 | Ingress Tool Transfer |
During RedPenguin, UNC3886 used backdoor malware capable of downloading files to compromised infrastructure.[2] |
|
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
During RedPenguin, UNC3886 created multiple strains of malware using names to mimic legitimate binaries such as appid, to, irad, lmpad, jdosd, and oemd.[2] |
| Enterprise | T1104 | Multi-Stage Channels |
During RedPenguin, UNC3886 used malware with separate channels to request and carry out tasks from C2.[2] |
|
| Enterprise | T1040 | Network Sniffing |
During RedPenguin, UNC3886 used a passive backdoor to act as a libpcap-based packet sniffer.[2] |
|
| Enterprise | T1095 | Non-Application Layer Protocol |
During RedPenguin, UNC3886 leveraged malware that used UDP and TCP sockets for C2.[2][3][1] |
|
| Enterprise | T1571 | Non-Standard Port |
During RedPenguin, UNC3886 used a backdoor that binds to port 45678 by default.[2] |
|
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
During RedPenguin, UNC3886 generated Base64-encoded files in the FreeBSD shell environment of targeted Juniper devices.[2][1] |
| Enterprise | T1057 | Process Discovery |
During RedPenguin, UNC3886 used malware capable of reading the PID for the Junos OS snmpd daemon.[1] |
|
| Enterprise | T1055 | Process Injection |
During RedPenguin, UNC3886 exploited CVE-2025-21590 to enable malicious code injection into the memory of legitimate processes.[2][1] |
|
| Enterprise | T1090 | Proxy |
During RedPenguin, UNC3886 used malware capable of establishing a SOCKS proxy connection to a specified IP and port.[2][1] |
|
| .003 | Multi-hop Proxy |
During RedPenguin, UNC3886 used infrastructure associated with operational relay box (ORB) networks.[2] |
||
| Enterprise | T1014 | Rootkit |
During RedPenguin, UNC3886 used rootkits such as REPTILE and MEDUSA.[2] |
|
| Enterprise | T1016 | System Network Configuration Discovery |
During RedPenguin, UNC3886 leveraged JunoOS CLI queries to obtain the interface index which contains system and network details.[2][1] |
|
| Enterprise | T1205 | Traffic Signaling |
During RedPenguin, UNC3886 leveraged malware capable of inpecting packets for a magic-string to activate backdoor functionalities.[2] |
|
| Enterprise | T1078 | Valid Accounts |
During RedPenguin, UNC3886 used legitimate credentials to gain priviliged access to Juniper routers.[2][3] |
|
| ID | Name | Description |
|---|---|---|
| S1220 | MEDUSA |
MEDUSA was used for command execution and persistence during RedPenguin.[2] |
| S1219 | REPTILE |
REPTILE was used for command execution and persistence during RedPenguin.[2] |