April 22, 2026

Backdoors, burn rates, and brawls

Iran claims US exploited networking equipment backdoors during strikes

Backdoors or just bad routers? Commenters split as “kill‑switch” rumors fly

TLDR: Iran says U.S. cyber ops flipped hidden switches in big-name routers; the U.S. only confirms it hit communications ahead of strikes. Commenters clash over backdoors vs sloppy security, fret about spent “zero-days,” and joke about car kill switches—raising big questions about trusting any connected gear.

Iran claims U.S. cyber teams tripped hidden “backdoors” in brand‑name routers to knock systems offline during airstrikes—and the comments section went DEFCON 1. One camp is shouting “of course there are kill switches!”, pointing to Snowden-era router tampering and old screwups from Cisco, Juniper, Fortinet, and MikroTik. Another camp fires back: you don’t even need secret backdoors when these boxes ship with terrible defaults and past hard‑coded passwords—as one user put it, a “treasure trove of shitty practices.”

Meanwhile, the U.S. isn’t commenting on alleged backdoors, but did confirm its cyber and space units were the “first movers” in Operation Epic Fury, disrupting Iranian comms before strikes. Cue the hot takes: some cheer that a $14.5B cyber budget buys movie‑level effects; others groan that Washington just burned precious “zero‑day” exploits for one operation. There’s also a spicy geopolitical thread: “buy from your friends,” says one commenter, while another warns about Chinese tech and remote‑disable “komrade cars.” Chinese state media is hyping Iran’s claim as proof of American skullduggery, while Western agencies still blame Beijing for Volt Typhoon.

Add in Iran’s 52‑day near‑blackout—the longest nationwide internet shutdown on record—and you’ve got a comments brawl over supply‑chain trust, cyberweapons spending, and whether this was a secret kill switch or just sloppy networks finally meeting a master hacker.

Key Points

  • Iranian state media alleged Cisco, Juniper, Fortinet, and MikroTik devices failed during U.S./Israeli operations, suggesting hidden backdoors or firmware sabotage.
  • The U.S. confirmed it conducted cyber operations; Gen. Dan Caine said U.S. Cyber Command and Space Command disrupted Iranian communications and sensors in Operation Epic Fury.
  • The allegations remain unverified, and the article notes skepticism due to their origin in state media.
  • Past security issues at all four vendors are cited: NSA TAO supply-chain implants (Cisco), Juniper ScreenOS unauthorized code (2015), Fortinet hardcoded credentials (2016), and MikroTik vulnerabilities (2019, per Tenable).
  • China’s NCVERC amplified Iran’s claims; Five Eyes have attributed the Volt Typhoon campaign to Chinese actors; Iran’s internet has been at ~1% for 52 days, the longest nationwide shutdown on record.

Hottest takes

“banning chinese routers and banning chinese cars ... remotely disabled by the komrades” — TacticalCoder
“burned through ... zero day stockpile” — Geof25
“treasure trove of shitty practices” — jeroenhd
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.