Threat IntelHIGH

China-Linked Red Menshen - Stealthy BPFDoor Implants Exposed

THThe Hacker News
Red MenshenBPFDoorcyber espionagetelecom networksRapid7
🎯

Basically, a group from China is using hidden tools to spy on telecom networks.

Quick Summary

Red Menshen, a China-linked threat group, is using stealthy BPFDoor implants for espionage in telecom networks. This ongoing campaign poses significant risks to government networks. Organizations must enhance their defenses to counteract these sophisticated threats.

The Threat

Red Menshen, a China-linked threat actor, has been conducting a long-term espionage campaign against telecom networks. This group, also known as Earth Bluecrow, has targeted government networks since at least 2021. They employ advanced techniques to implant stealthy access mechanisms within critical environments, making detection extremely difficult.

Their primary tool, BPFDoor, is a Linux backdoor that operates without exposing traditional command-and-control channels. Instead, it utilizes the Berkeley Packet Filter (BPF) to inspect network traffic directly within the kernel. This allows the threat actor to remain hidden while monitoring and manipulating network operations.

Who's Behind It

Red Menshen has a reputation for targeting telecom providers across regions like the Middle East and Asia. Their operations are characterized by a range of sophisticated techniques, including the use of kernel-level implants and credential-harvesting utilities. By embedding themselves deeply within telecom infrastructure, they can maintain persistent access to sensitive networks.

The group’s activities often start by targeting exposed services like VPN appliances and firewalls from major providers such as Cisco and Fortinet. Once they gain a foothold, they deploy additional tools like CrossC2 and Sliver to facilitate further exploitation and lateral movement within the compromised systems.

Tactics & Techniques

Red Menshen's use of BPFDoor is particularly concerning due to its stealthy nature. The backdoor consists of two components: a passive backdoor that listens for a specific trigger packet, and a controller that sends these packets to activate the implant. This setup allows for controlled lateral movement between compromised systems without raising alarms.

Additionally, the latest variant of BPFDoor has introduced features to enhance its evasion capabilities. For instance, it can hide its trigger packets within legitimate HTTPS traffic, making detection even more challenging. This evolution reflects a broader trend where attackers are embedding their tools deeper into operating systems and infrastructure platforms.

Defensive Measures

Organizations must be vigilant against such sophisticated threats. Implementing strong network segmentation and monitoring for unusual traffic patterns can help detect potential intrusions. Regularly updating and patching systems, especially those exposed to the internet, is crucial to mitigate risks.

Moreover, employing advanced threat detection solutions that can analyze traffic at the kernel level may provide additional layers of security. As Red Menshen continues to evolve its tactics, staying informed about emerging threats and adapting defenses accordingly will be essential for safeguarding sensitive telecom networks.

🔒 Pro insight: Red Menshen's use of BPFDoor highlights a shift towards deeper, kernel-level implants in telecom environments, complicating detection efforts.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - U.S. Cybersecurity Offensive Edge Slipping

Former NSA leaders warn that the U.S. is losing its offensive edge in cybersecurity. With threats from AI and China growing, urgent action is needed. The safety of the nation hangs in the balance.

CyberScoop·
HIGHThreat Intel

TeamPCP Supply Chain Campaign - Update on Threat Developments

The TeamPCP supply chain campaign has seen new developments. This update reveals a broader scope and new detection tools. Organizations must adapt to these changes to safeguard their systems.

SANS ISC·
HIGHThreat Intel

Threat Intel - Trends in Fortinet’s 2026 Report Explained

Fortinet's latest report reveals a troubling rise in AI-driven cybercrime. Aamir Lakhani discusses how these trends impact cybersecurity strategies. Understanding these developments is crucial for effective defense.

SC Media·
HIGHThreat Intel

Threat Intel - LeakBase Hacker Forum Admin Arrested

Russian law enforcement has arrested the admin of LeakBase, a hacker forum trading stolen data. This operation disrupts a major cybercrime network. The arrest could lead to identifying more cybercriminals.

Cyber Security News·
HIGHThreat Intel

Threat Intel - Silver Fox Evolves Phishing Tactics to Python Stealers

Silver Fox, a China-based threat actor, has evolved its phishing tactics, now using custom Python stealers. Targeting South Asia, this shift raises significant risks for organizations. Vigilance against tax-related phishing emails is crucial to safeguard sensitive data.

Cyber Security News·
HIGHThreat Intel

Threat Intel - Red Menshen Plants BPFdoor Backdoors in Telecom

A sophisticated espionage campaign by Red Menshen embeds BPFdoor backdoors in telecom networks. This poses serious risks to global communications and national security. Rapid7 Labs reveals the advanced tactics used.

Cyber Security News·