"New EtherOops Attack Takes Advantage of Faulty Ethernet Cables"
A team of researchers from the Internet of Things (IoT) security company Armis discovered a technique, dubbed EtherOops, that could be used to attack devices placed inside closed enterprise networks. According to the researchers, the method can only be executed if the targeted network has faulty Ethernet cables. The EtherOops technique is a theoretical attack discovered in a laboratory setting and is not a widespread issue facing networks globally in their default states. However, researchers warn that the technique could be used under a particular set of circumstances by sophisticated attackers such as nation-state actors. The EtherOops attack is considered a packet-in-packet attack in which network packets are nested inside each other, with the outer packet being benign and the inner packet consisting of malicious code or commands. The outer packet enables the attack payload to circumvent firewalls and other initial network defenses. This article continues to discuss how faulty Ethernet cables come to play in the EtherOops attack and the attack's chances of success.
ZDNet reports "New EtherOops Attack Takes Advantage of Faulty Ethernet Cables"