π―A group of hackers from China is using super sneaky malware to break into phone and internet networks around the world. They're getting really good at hiding, which makes it hard for companies to catch them. This is a big deal because it could let them spy on important information.
The Threat
A recent investigation by Rapid7 Labs has revealed a sophisticated threat actor known as Red Menshen, linked to China, infiltrating global telecommunications networks. This group is deploying stealthy digital sleeper cells designed for high-level espionage. The implications of these infiltrations are vast, as telecom networks serve as the backbone for government communications and critical infrastructure. When compromised, the fallout can affect entire populations, making this a pressing national security issue.
Telecommunications networks are not just conduits for voice and data; they are the central nervous system of the digital age. They manage sensitive communications and hold vast amounts of personal data. The strategic positioning of these networks makes them prime targets for espionage, where attackers can exploit vulnerabilities to gain extensive insights into communications and operations.
Who's Behind It
Red Menshen's operations are not isolated incidents but part of a structured campaign aimed at establishing persistent access to telecom infrastructure. This group has been observed embedding stealthy access mechanisms within telecom environments, allowing them to maintain long-term footholds. This approach contrasts sharply with traditional short-term attacks, indicating a shift towards more sophisticated and prolonged intrusion strategies. The group employs various advanced tools, including BPFdoor, a stealth Linux backdoor that operates within the operating system kernel. Recent findings have revealed seven new variants of BPFdoor that significantly enhance its ability to remain undetected. Among these, httpShell and icmpShell stand out for their advanced capabilities, including stateless command-and-control routing and the ability to tunnel commands through internal systems using ICMP traffic, which is often overlooked by monitoring tools. The H variant of BPFdoor has also been noted for its active beacon that performs NTP-themed domain resolution, disguising encrypted sessions as IoT telemetry or time synchronization.
Tactics & Techniques
The tactics employed by Red Menshen involve embedding implants deep within the telecom infrastructure, targeting operating system kernels rather than relying solely on user-space malware. The new variants of BPFdoor abuse the Berkeley Packet Filter, a legitimate Linux kernel function, allowing them to monitor network traffic without opening visible ports. This passive design enables the malware to remain undetected for extended periods, sometimes months or even years.
Initial access to telecom environments often occurs through exposed edge services, where attackers exploit vulnerabilities in public-facing applications and devices. Once inside, they deploy various tools to maintain access and facilitate lateral movement within the network. The new BPFdoor variants can tunnel commands through internal systems using ICMP traffic, which is often overlooked by monitoring tools. This capability, combined with their support for telecom-native protocols, indicates that these tools were specifically designed for high-value, deep-infrastructure targets.
Defensive Measures
For defenders, the implications of these findings are significant. Many organizations lack visibility into kernel-level operations and raw packet-filtering behavior, making it challenging to detect such sophisticated intrusions. To counter these threats, organizations must expand their defensive strategies to include deeper inspection of operating system behavior and infrastructure layers.
Rapid7 has taken steps to notify potential victims and share findings with relevant authorities. Security teams should monitor for raw socket usage on Linux endpoints, audit process names against known services, and watch for unexpected ICMP traffic within internal networks. Organizations are urged to closely monitor atypical BPF filters and other structural aberrations to prevent potential compromise. Enhancing security posture by implementing advanced detection mechanisms and collaborating with national CERTs is crucial as the threat landscape evolves.
The emergence of new BPFdoor variants highlights the evolving tactics of threat actors, necessitating a proactive approach in cybersecurity defenses, especially within critical infrastructure sectors.





