LOUNGE all new asksnapzu ideasforsnapzu newtribes interesting pics videos funny technology science technews gaming health history worldnews business web research entertainment food living internet socialmedia mobile space sports photography nature animals movies culture travel television finance music celebrities gadgets environment usa crime politics law money justice psychology security cars wtf art google books lifetips bigbrother women apple kids recipes whoa military privacy education facebook medicine computing wildlife design war drugs middleeast diet toplists economy fail violence humor africa microsoft parenting dogs canada neuroscience architecture religion advertising infographics sex journalism disaster software aviation relationships energy booze life japan ukraine newmovies nsa cannabis name Name of the tribe humanrights nasa cute weather gifs discoveries cops futurism football earth dataviz pets guns entrepreneurship fitness android extremeweather fashion insects india northamerica
-1 1 2
Published 3 years ago with 2 Comments
Additional Contributions:

Join the Discussion

  • Auto Tier
  • All
  • 1
  • 2
  • 3
Post Comment
  • idlethreat
    +4

    The implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules from the anonymity of the internet.

    So, this would be considered a local attack. Someone with physical access to the equipment itself is installing a revised version of the IOS firmware on affected devices to which they are able to gain access. It is not a bug. It is a revised firmware which allows access.

    • JTtheGhost
      +1

      Helps to reinforce the fact that physical access control Is just as important as security on the configs :/

Here are some other snaps you may like...