• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Federal Authorities Have Seized More Than $143 Million USD Of Fake Network Equipment

May 10, 2010

Views: 8,104

[ad]

What a surprise, another quiet weekend – nothing much has been going on apart from the big furore about Facebook privacy – which frankly has been discussed to death.

Other than that, 2 critical patches are expected in the next Microsoft patch Tuesday – info here and here.

One story which I did find interesting was about fake networking gear, mostly Cisco which the Feds have been seizing for the past 5 years under Operation Network Raider – with more than 700 seizures and 30 felony convictions, that sure is a lot of dodgy gear out there!

Federal authorities over the past fives year have seized more than $143m worth of counterfeit Cisco hardware and labels in a coordinated operation that’s netted more than 700 seizures and 30 felony convictions, the Justice Department said Thursday.

Operation Network Raider is an enforcement initiative involving the FBI, Immigration and Customs Enforcement and Customs and Border Protection agencies working to crack down on the bogus routers, switches and other networking gear. In addition to costing Cisco and other US businesses millions of dollars, the scams could threaten national security by infusing critical networks with gear that’s unreliable or, worse, riddled with backdoors.

As part of the operation, Ehab Ashoor, 49, a Saudi citizen residing in Sugarland, Texas, was sentenced this week to 51 months in prison and ordered to pay Cisco $119,400 in restitution after being found guilty of trying to sell counterfeit gear to the US Department of Defense. In 2008, he attempted to traffic 100 gigabit interface converters that were bought in China and contained labels fraudulently indicating they were genuine Cisco equipment, according to court documents. The kit was to be used by the US Marine Corps for communications in Iraq

The scary part for me is not that this stuff is out there, but that it is being sold to the US government! Especially that some was destined to be used by the US Military in Iraq. Now with the relations between China and the US the conspiracy theorists could come up with some interesting thoughts on this.

The sentences handed out are pretty stiff though with 51 months in prison, even though I guess it’ll be some cushy white-collar prison and not some hardcore federal penitentiary.

In January, 33-year-old Chinese resident Yongcai Li was ordered to serve 30 months in prison and pay restitution of $790,683 for trafficking counterfeit Cisco gear, officials said.

The prospect that government and business networks may have deployed bogus gear has raised national security concerns, since much of the counterfeit equipment originates in China. Similar espionage fears were raised by research from University of Illinois researchers, who in 2008 showed how they were able to modify a Sun Microsystems SPARC microprocessor to effectively create a hardwired backdoor capable of logging passwords or other sensitive data.

In May of 2008, Cisco officials said they had no evidence that any of the counterfeit networking gear contained backdoors.

Since late 2007, US authorities have made more than 1,300 seizures of 5.6 million bogus semiconductors. More than 50 shipments were falsely marked as military or aerospace grade devices. The Justice Department’s press release is here.

From the restitution figures it seems like Yongcai Li sold a lot higher volume than Ehab Ashoor but his prison sentence is much shorter. Perhaps he was given a more lenient sentence as he wasn’t directly trying to sell the fake gear to the US government and military.

They state none of the networking equipment contained backdoors, but then if they did – would they really tell anyone? They were obviously trying to buy cheap gear on the side rather than dealing directly with Cisco – not a wise decision.

Source: The Register

Related Posts:

  • Privacy Implications of Web 3.0 and Darknets
  • An Introduction To Web Application Security Systems
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
  • MyEtherWallet DNS Hack Causes 17 Million USD User Loss
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Fake News As A Service (FNaaS?) - $400k To Rig An Election
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues Tagged With: cisco



Reader Interactions

Comments

  1. Benito Mussolini says

    May 10, 2010 at 1:22 pm

    The United States government has no problem blowing money on just about everything else. This is one case where they would have been better off to just pony up and buy directly from Cisco. The difference in price couldn’t have been that drastic.

  2. Dilbert says

    May 10, 2010 at 2:00 pm

    So why hasn’t anyone reverse-engineered the software/OS on this bogus hardare to see exactly what’s going on?

  3. CaseInPoint says

    May 10, 2010 at 2:11 pm

    I’d appreciate some way of verifying that my cisco equipment isn’t some of this bogus stuff. We purchase used Cisco equipment simply because it’s so dang expensive to buy it otherwise.

    • Darknet says

      May 11, 2010 at 7:43 am

      There’s some good info here:

      Identifying Fake Chisco

      And a more technical approach here:

      Identifying Counterfeit Cisco Equipment

  4. Zimmie says

    May 10, 2010 at 3:14 pm

    Strictly, the devices probably were not sold to the U.S. government directly, but to a contractor. The contractors are getting a fixed amount of money based on their bid for fulfilling the requirements of the contract (at least, that’s how it is supposed to work). If they find a “great deal” on line cards or backplanes, they may go with that to save some money thereby saving more of the contract money as profit.

    This is why HMOs, low-bid contracts, and anything else that offers a fixed or negotiated-up-front fee for variable cost work will *always* result in low-quality output.

    • Darknet says

      May 11, 2010 at 7:43 am

      That’s true and yah good point, any fixed price tenders will be prone to this kind of issue with people looking to maximize profits.

  5. John Stafford says

    May 12, 2010 at 10:48 pm

    A good way to guarantee that you purchase quality equipment is to work with companies who are associated with organizations such as UNEDA. The United Network Equipment Dealer Association (UNEDA) is a worldwide alliance of over 275 companies whose primary business is supplying pre-owned networking equipment. Members represent the entire spectrum of the secondary market, from companies with hundreds of employees and millions of dollars in inventory to small, entrepreneurial organizations. Together their combined yearly buying clout exceeds $2.5 billion, representing the sale of millions of pieces of equipment to tens of thousands of customers worldwide. UNEDA members must adhere to a strict code of ethics that includes a firm policy against selling any equipment that is not legitimate and are immediately removed from membership if they break this rule. UNEDA works hand in hand with multiple government agencies to help eradicate counterfeit and stolen equipment from being sold to end-user customers.

    John Stafford
    UNEDA
    [email protected]

  6. Csgod0 says

    May 13, 2010 at 5:24 am

    LOL, so let see.. take a Cisco 6509 chassis, load it up with twin redundant power supplies, twin sup modules, and full 9 blades, and you’re looking at a HELLA lot of money. Thats not that much equipment, just costs a whoole lot :D

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 878

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 887

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 512

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,841

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 585

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 619

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,406,803)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,934)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,383)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,209)
  • Password List Download Best Word List – Most Common Passwords (934,468)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,175)
  • Hack Tools/Exploits (674,118)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,180)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy