{"id":24698,"date":"2019-01-26T11:04:05","date_gmt":"2019-01-26T11:04:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/"},"modified":"2019-01-26T11:04:05","modified_gmt":"2019-01-26T11:04:05","slug":"miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/","title":{"rendered":"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed&#8230;"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/04\/11\/siren_shutterstock.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> This week we saw <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/24\/hadoop_malware_attack\/\">Hadoop hacks<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/25\/microsoft_exchange_domain_admin_eop\">Exchange exploits<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/23\/scammers_virgin_media_honeypot\/\">Deadpool besting scammers<\/a>.<\/p>\n<p>Here&#8217;s some more computer security news to round off your week&#8230;<\/p>\n<h3 class=\"crosshead\"><span>Alarms sounded over incoming Cisco attacks<\/span><\/h3>\n<p>Earlier this week, Cisco cleaned up <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/24\/cisco_sd_wan_bugs\/\">a series of security flaws<\/a> in its routers. Now, admins are being urged to apply those fixes as soon as possible now that exploits for two flaws in particular are public.<\/p>\n<p>A security dev going by the name of David Davidson has <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/github.com\/0x27\/CiscoRV320Dump\">provided proof-of-concept code<\/a> that leverages a data-disclosure vulnerability (CVE-2019-1653) in the RV320 WAN router, and extracts various configuration files and other information from the machine. You don&#8217;t have to be authenticated, you just have to be able to reach the router&#8217;s web-based management portal. This is useful for checking whether or not a device is vulnerable, and whether Cisco&#8217;s patch actually works.<\/p>\n<p>The code also achieves remote code execution as root on the router (exploiting CVE-2019-1652) if you know any valid login creds for the box. You can always try to crack the passwords fetched via the info-disclosure bug, or brute-force or guess them.<\/p>\n<p>What&#8217;s more, botnet watcher <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/bad_packets\/status\/1088876712933306368\">Troy Mursch has spotted<\/a> miscreants scanning the public internet for vulnerable RV320 routers. This means we now have both working exploits and people trying to find vulnerable devices.<\/p>\n<p>If you&#8217;re an admin at a company running one or more of these Cisco WAN routers, you will want to make sure all of the boxes have the latest patches installed, and you should probably do it ASAP.<\/p>\n<h3 class=\"crosshead\"><span>Adobe Experience Manager gets patched up<\/span><\/h3>\n<p>While not as prominent as other products like Create Cloud or Flash, Adobe&#8217;s Experience Manager is a well-used CMS and forms platform. So anyone running it will want to make sure they have installed the patches Adobe posted earlier this week.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blogs.adobe.com\/psirt\/?p=1692\">The update<\/a> patches up cross-site scripting and information disclosure flaws in Experience Manager and one cross-site scripting vulnerability in Experience Manager Forms. Updating to the latest version will apply all of the needed patches.<\/p>\n<p>Credit for discovering the Forms bug was given to researcher Adam Willard.<\/p>\n<div class=\"boxout\" readability=\"26.001928640309\">\n<p><strong>In brief&#8230;<\/strong> Millions of loan and mortgage documents were accidentally exposed to the public internet via a <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/securitydiscovery.com\/document-management-company-leaks-data-online\/\">poorly secured database<\/a>, TechCrunch <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/techcrunch.com\/2019\/01\/23\/financial-files\/\">reports<\/a>. The system has since been secured.<\/p>\n<p>The PHP Extension and Application Repository (PEAR) was <a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/blog.pear.php.net\/\">hacked<\/a>, and go-pear.phar was maliciously tampered with. Anyone who downloaded that software manager between July 2018 and January 2019 may have fetched a poisoned version. &#8220;If you have downloaded this go-pear.phar in the past six months, you should get a new copy of the same release version from GitHub (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/github.com\/pear\/pearweb_phars\">pear\/pearweb_phars<\/a>) and compare file hashes. If different, you may have the infected file,&#8221; the PEAR team warned this week.<\/p>\n<p>Google has <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics\/\">removed two programs<\/a> from its Android Play Store \u2013 Currency Converter and BatterySaverMobi \u2013 that contained online-bank-account-raiding Trojan Anubis. Interestingly, the malware also detects the phone&#8217;s motion sensors for movement: if any is detected, it continues on, and if not, then it figures it&#8217;s being analyzed in an emulator, and kills itself.<\/p>\n<\/div>\n<h3 class=\"crosshead\"><span>Girl Scouts and HPE to offer cyber-security merit badge<\/span><\/h3>\n<p>HPE is going to be teaching Girl Scouts how to manage an entirely new type of cookie, as the enterprise tech giant announced this week it would work with the young women&#8217;s group to offer <a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.gscnc.org\/en\/council\/news\/2019\/girl_scouts_nation_s.html\">a new cybersecurity badge<\/a>.<\/p>\n<p>The patch will be offered through the Girl Scout Juniors (age 9-11) program and will be focused on how scouts can protect themselves online and steer clear of identity theft and financial fraud schemes.<\/p>\n<p>&#8220;Girls are going online earlier and earlier, and it\u2019s especially crucial that they are equipped with the knowledge and tools they need to be savvy consumers, to protect themselves, their identity and data,&#8221; said CEO Lidia Soto-Harmon of Girl Scouts Nation&#8217;s Capital.<\/p>\n<p>In addition to the patch, the Girl Scouts and HPE are going to develop an online game that centers around how to deal with online scams and privacy protection.<\/p>\n<h3 class=\"crosshead\"><span>Washington DC worries over bugged Chinese rail cars<\/span><\/h3>\n<p>Security paranoia is nothing new in the US capital, but this latest episode of infosec scrutiny might be a bit much even for Washington, DC.<\/p>\n<p>A <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.nextgov.com\/cybersecurity\/2019\/01\/senators-wmata-how-will-you-keep-next-gen-metro-cars-safe-foreign-tampering\/154346\/\">report from NextGov<\/a> examines how Senators have become concerned that the planned overhaul of the District&#8217;s metro rail system with new carriages could put national security at risk.<\/p>\n<p>Four Senators <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.scribd.com\/document\/397856431\/WMATA-Cyber-Concerns-8000-Series-Rail-Car-RFP\">have signed a letter<\/a> asking the head of the Washington Metropolitan Area Transit Authority to develop a plan to make sure that the agency does not end up purchasing cars from Chinese companies that might be bugged by that country&#8217;s government.<\/p>\n<p>The agency is reportedly planning to amend its request for proposals to include a requirement that the cars be built to NIST information security standards.<\/p>\n<h3 class=\"crosshead\"><span>National intelligence advisers urge US to push hard on cybersecurity<\/span><\/h3>\n<p>While it is no secret that the US government is trying to improve its cybersecurity protections and practices, a key report this week signaled an even greater urgency is needed.<\/p>\n<p>The National Intelligence Service <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.intel.gov\/templates\/intelgov-template\/custom-sections\/the-nis-at-a-glance\/pdf\/National_Intelligence_Strategy_2019.pdf?mod=article_inline\">has released<\/a> its first report in four years on the US security threat landscape, and cyber looks to be a top priority.<\/p>\n<p>For the first time the report places cybersecurity intelligence alongside areas like counterterrorism and counterintelligence, a signal that, at least as far as intelligence officials are concerned, data protection is now every bit as important as securing physical securities and guarding against spies.<\/p>\n<p>&#8220;We face significant changes in the domestic and global environment; we must be ready to meet 21st century challenges and to recognize emerging threats and opportunities,&#8221; the report reads.<\/p>\n<p>&#8220;To navigate today\u2019s turbulent and complex strategic environment, we must do things differently.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Trump man hauled in on charges of WikiLeaks dealing<\/span><\/h3>\n<p>A key figure in Donald Trump&#8217;s presidential run has been cuffed and accused by the FBI of lying to Congress about the campaign&#8217;s use of stolen Democratic party emails to derail rival Hillary Clinton&#8217;s bid for the White House.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.reuters.com\/article\/us-usa-trump-russia\/trump-ally-roger-stone-arrested-for-lying-to-congress-idUSKCN1PJ16M\">Roger Stone was cuffed<\/a> early Friday morning after being indicted on seven charges related to the ongoing Mueller probe into the 2016 White House race. Specifically, he was charged with one count of obstruction of an official proceeding, five counts of false statements, and one count of witness tampering.<\/p>\n<p>Among the allegations is the claim that Stone was part of the chain of intelligence between the Trump administration and WikiLeaks, which allegedly obtained sensitive Democratic party documents from Russian agents. Those documents \u2013 emails lifted from the Clinton campaign and DNC by Kremlin hackers \u2013 were credited with helping, in part, Trump win the 2016 election.<\/p>\n<p>It should be noted that WikiLeaks has categorically denied the emails came from Russia. Stone denies any wrongdoing.<\/p>\n<h3 class=\"crosshead\"><span>CitizenLab creeped out by government surveillance<\/span><\/h3>\n<p>Digital rights and research group CitizenLab says it has been the target of surveillance, possibly from the shadowy Israeli digital intelligence firm NSO Group.<\/p>\n<p>The research foundation revealed on Friday that two of its investigators had been approached by people who were trying to collect sensitive personal information by creating fake companies and identities. On both occasions, CitizenLab said, it sniffed out the operations and confronted the individuals.<\/p>\n<p>While Citizen Lab says it can&#8217;t definitively tie the operation to NSO Group, it has a pretty strong hunch the company is in some way connected. Researchers were asked about antisemitism at the non-profit and whether this would have sparked interest in investigations.<\/p>\n<p>&#8220;This failed operation against two Citizen Lab researchers is a new low. Citizen Lab research is public, and the evidence that we use to draw our conclusions is public as well,&#8221; <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/citizenlab.ca\/2019\/01\/statement-from-citizen-lab-director-on-attempted-operations-against-researchers\/\">CitizenLab said<\/a>.<\/p>\n<p>&#8220;We have always welcomed debate and dialogue about our work, but we condemn these sinister, underhanded activities in the strongest possible terms. Such a deceitful attack on an academic group like the Citizen Lab is an attack on academic freedom everywhere.&#8221; \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/01\/26\/security_roundup_250119\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230;PHP&#8217;s PEAR sabotaged for months, and more from the world of infosec Roundup\u00a0 This week we saw Hadoop hacks, Exchange exploits, and Deadpool besting scammers.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24699,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-24698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed... 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed... 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-26T11:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed&#8230;\",\"datePublished\":\"2019-01-26T11:04:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/\"},\"wordCount\":1335,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/\",\"name\":\"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed... 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg\",\"datePublished\":\"2019-01-26T11:04:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg\",\"width\":648,\"height\":433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed... 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/","og_locale":"en_US","og_type":"article","og_title":"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed... 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-26T11:04:05+00:00","og_image":[{"width":648,"height":433,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed&#8230;","datePublished":"2019-01-26T11:04:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/"},"wordCount":1335,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/","url":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/","name":"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed... 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg","datePublished":"2019-01-26T11:04:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed.jpg","width":648,"height":433},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/miscreants-sweep-internet-for-unpatched-cisco-kit-fears-over-bugged-chinese-parts-roger-stone-nabbed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Miscreants sweep internet for unpatched Cisco kit, fears over bugged Chinese parts, Roger Stone nabbed&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24698"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24699"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}