Threat IntelHIGH

Threat Intel - Red Menshen Plants BPFdoor Backdoors in Telecom

CSCyber Security News
Red MenshenBPFdoortelecommunicationsRapid7China
🎯

Basically, hackers are sneaking hidden backdoors into telecom networks to spy on communications.

Quick Summary

A sophisticated espionage campaign by Red Menshen embeds BPFdoor backdoors in telecom networks. This poses serious risks to global communications and national security. Rapid7 Labs reveals the advanced tactics used.

The Threat

A recent investigation by Rapid7 Labs has uncovered a sophisticated espionage campaign led by the state-sponsored group known as Red Menshen. This campaign is notable for its use of a stealthy backdoor called BPFdoor, which has been embedded within global telecommunications infrastructure. Unlike typical hacking incidents, this operation signifies a strategic shift from opportunistic attacks to long-term infiltration. By embedding themselves into the backbone of national and international communications, these hackers aim to gather intelligence on high-value targets.

Telecommunications networks are crucial for government communications, subscriber identity authentication, and coordination of critical industries. The potential for intelligence collection in these environments is vast, far exceeding the capabilities of a conventional data breach. With persistent access, attackers can monitor subscriber identifiers and communication metadata, enabling extensive tracking of geopolitical targets.

Who's Behind It

The Red Menshen group has specifically targeted telecom providers across various regions, including South Korea, Hong Kong, Myanmar, Malaysia, Egypt, and parts of the Middle East. The collateral damage extends to government networks that rely on these carriers, amplifying the risk of sensitive data exposure. The stealthy nature of their operations, combined with the strategic importance of the telecommunications sector, makes this a significant threat to national security.

Tactics & Techniques

At the heart of this campaign is the BPFdoor backdoor, which operates at the kernel level of Linux systems. It exploits the Berkeley Packet Filter (BPF) functionality to monitor incoming traffic without raising alarms. Unlike conventional malware, BPFdoor does not create visible command-and-control channels. Instead, it waits for a specially crafted packet to activate, making detection extremely difficult.

Rapid7 Labs discovered an advanced variant of BPFdoor that conceals its activation commands within legitimate HTTPS traffic. This clever tactic allows the malware to blend seamlessly into normal network operations, evading traditional security measures. The use of ICMP-based control channels further enhances its stealth, enabling compromised servers to communicate without standard C2 traffic.

Defensive Measures

In response to these findings, Rapid7 has collaborated with national CERTs and government partners to alert affected organizations. They have also released a free, open-source scanning tool to help detect both legacy and new BPFdoor variants. Organizations are urged to enhance their monitoring capabilities, focusing on kernel-level operations and unusual BPF filter activities. By increasing visibility in these areas, defenders can better protect their networks against such sophisticated threats.

As the landscape of cyber threats continues to evolve, the implications of this espionage campaign underscore the need for robust security measures in the telecommunications sector. The stakes are high, and vigilance is essential to safeguard sensitive communications.

🔒 Pro insight: The BPFdoor backdoor's kernel-level operation highlights the need for enhanced monitoring of network traffic and kernel activities to detect stealthy threats.

Original article from

Cyber Security News · Guru Baran

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - U.S. Cybersecurity Offensive Edge Slipping

Former NSA leaders warn that the U.S. is losing its offensive edge in cybersecurity. With threats from AI and China growing, urgent action is needed. The safety of the nation hangs in the balance.

CyberScoop·
HIGHThreat Intel

TeamPCP Supply Chain Campaign - Update on Threat Developments

The TeamPCP supply chain campaign has seen new developments. This update reveals a broader scope and new detection tools. Organizations must adapt to these changes to safeguard their systems.

SANS ISC·
HIGHThreat Intel

Threat Intel - Trends in Fortinet’s 2026 Report Explained

Fortinet's latest report reveals a troubling rise in AI-driven cybercrime. Aamir Lakhani discusses how these trends impact cybersecurity strategies. Understanding these developments is crucial for effective defense.

SC Media·
HIGHThreat Intel

Threat Intel - LeakBase Hacker Forum Admin Arrested

Russian law enforcement has arrested the admin of LeakBase, a hacker forum trading stolen data. This operation disrupts a major cybercrime network. The arrest could lead to identifying more cybercriminals.

Cyber Security News·
HIGHThreat Intel

Threat Intel - Silver Fox Evolves Phishing Tactics to Python Stealers

Silver Fox, a China-based threat actor, has evolved its phishing tactics, now using custom Python stealers. Targeting South Asia, this shift raises significant risks for organizations. Vigilance against tax-related phishing emails is crucial to safeguard sensitive data.

Cyber Security News·
HIGHThreat Intel

Threat Intel - Russia Arrests Alleged Admin of LeakBase Forum

Russian authorities have arrested the alleged admin of the LeakBase cybercrime forum. This forum was a major hub for stolen data, affecting thousands. The arrest underscores a significant effort to combat cybercrime in Russia.

SC Media·