Check Point Research reveals a malicious firmware implant for TP-Link routers, linked to Chinese APT group

Highlights Check Point Research (CPR) exposes a malicious firmware implant for TP-Link routers which allowed attackers to gain full control of infected devices and access compromised networks while evading detection. CPR attributes the attacks to a Chinese state-sponsored APT group dubbed “Camaro Dragon”. The group overlaps with activity previously attributed to Mustang Panda. The deployment method of the firmware images remains uncertain, as does its usage and involvement in actual intrusions. Executive Summary Recently, Check Point Research investigated a sequence of targeted cyberattacks against European foreign affairs entities and attributed them to a Chinese state-sponsored Advanced Persistent Threat (APT) group […]

The post Check Point Research reveals a malicious firmware implant for TP-Link routers, linked to Chinese APT group appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/RHQU0pc
via

No comments:

Post a Comment

Check Point Harmony Endpoint: Strategic Leader in Real-World Endpoint Protection

In the ever-evolving landscape of cybersecurity, theoretical protection is not enough. Businesses need solutions that stand up to real-worl...