Firestarter Backdoor Survives Cisco Patch Cycles on Firepower Gear

1 min read
Source: BleepingComputer
Firestarter Backdoor Survives Cisco Patch Cycles on Firepower Gear
Photo: BleepingComputer
TL;DR Summary

U.S. CISA and U.K. NCSC warn that Firestarter malware persists on Cisco Firepower/ASA/FTD devices after patches, maintaining persistence by hooking into the LINA process and re‑launching after reboots or firmware updates; attackers used Line Viper to gain initial access before deploying Firestarter. Cisco provides mitigations and recommends reimaging, with cold restart as a last resort (risking disk damage); CISA has released YARA rules to aid detection.

Share this article

Reading Insights

Total Reads

0

Unique Readers

3

Time Saved

4 min

vs 5 min read

Condensed

92%

86566 words

Want the full story? Read the original article

Read on BleepingComputer