Benjamin Carr, Ph.D. 👨🏻💻🧬<p><a href="https://hachyderm.io/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a>'s hackers use custom malware to spy on <a href="https://hachyderm.io/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://hachyderm.io/tags/telecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telecom</span></a> networks<br><a href="https://hachyderm.io/tags/JumpedPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JumpedPath</span></a> is a Go-based ELF binary built for Linux that allowed it to run on a variety of edge networking devices from different manufacturers, including <a href="https://hachyderm.io/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a><br>JumbledPath allowed <a href="https://hachyderm.io/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> to initiate packet capture on Cisco device via a jump-host, an intermediary system that made capture appear as if they originate from a trusted device inside the network while also obfuscating attacker's location <a href="https://www.bleepingcomputer.com/news/security/salt-typhoon-uses-jumbledpath-malware-to-spy-on-us-telecom-networks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/salt-typhoon-uses-jumbledpath-malware-to-spy-on-us-telecom-networks/</span></a></p>