Cyber Espionage Alert: Juniper & Palo Alto Networks Devices Under Siege!
Juniper Networks and Palo Alto Networks are getting more attention than a celebrity at a grocery store. Researchers suspect espionage, botnet building, or zero-day exploits. So, if your router password is still “1234,” now’s a great time to change it. After all, unwanted guests love easy access, even in the digital world.

Hot Take:
Who knew that “t128” and “128tRoutes” could be the Bonnie and Clyde of the cyber world? These default credentials have become the talk of the town, starring in their own soap opera of espionage, botnets, and zero-day vulnerability exploitation. With more IPs than a pandemic-era Zoom call, it’s like the Wild West of network security out there—but instead of tumbleweeds, we’ve got rogue IP addresses rolling through.
Key Points:
- Juniper Networks devices are being probed using default credentials “t128” and “128tRoutes”.
- Approximately 3,000 source IPs involved, likely part of a “Mirai Type” botnet.
- Palo Alto Networks also experiencing mass probing, with nearly 24,000 IP addresses targeting PAN-OS GlobalProtect portals.
- GreyNoise suspects these activities are linked to undisclosed vulnerabilities or espionage attempts.
- Both companies are actively monitoring and advising users to update credentials and software.
Already a member? Log in here