Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Hackers Target Telecoms With New Malware

China-Linked Hackers Target Telecoms With New Malware

Posted on March 6, 2026 By CWS

A China-linked hacking group has been systematically targeting telecommunications companies across South America since 2024. This group, known as UAT-9244, is deploying a trio of new malware implants to penetrate critical network infrastructure.

Targeting Telecommunications Infrastructure

UAT-9244, an advanced persistent threat (APT) group, has focused its efforts on both Windows and Linux-based systems, as well as on network edge devices essential for telecom operations. These attacks are characterized by their strategic approach to compromising and expanding control over these networks.

The group’s arsenal includes three distinct malware tools. TernDoor, a Windows backdoor, is a new iteration of the previously documented CrowDoor malware. PeerTime, a Linux-based tool, utilizes the BitTorrent protocol for communication, blending in with legitimate network traffic. BruteEntry, the third tool, transforms compromised devices into relay boxes that brute-force access to various servers.

Links to Known APT Groups

Cisco Talos researchers have connected UAT-9244 with other China-nexus APTs like FamousSparrow and Tropic Trooper. This connection is based on shared tools, tactics, and targeted victims. TernDoor, for example, can trace its lineage back to SparrowDoor, associated with FamousSparrow.

Furthermore, the PeerTime tool contains debug strings in Simplified Chinese, indicating the involvement of Chinese-speaking threat actors. The operation’s extensive infrastructure includes a shared SSL certificate linked to multiple IP addresses, showcasing a well-resourced network.

Malware Techniques and Mitigation

TernDoor’s deployment involves DLL side-loading, where a benign executable loads a malicious file. This method allows the malware to evade file-based detection. Once active, TernDoor injects itself into a Windows process, executes remote commands, and communicates with its operator.

To maintain persistence, TernDoor creates scheduled tasks and alters registry keys. It also installs a Windows driver that can disable security tools. Security teams are advised to audit system tasks, monitor for DLL side-loading, and block known C2 IP addresses as part of their defense strategy.

The ongoing threat posed by UAT-9244 underscores the importance of robust cybersecurity measures in the telecommunications sector. By understanding and mitigating these sophisticated attacks, organizations can better protect their critical infrastructure.

Cyber Security News Tags:APT, BruteEntry, China-linked Hackers, Cybersecurity, Malware, network security, PeerTime, Telecommunications, TernDoor, UAT-9244

Post navigation

Previous Post: FBI Security Breach, Iranian Camera Hack, and More Cyber Developments
Next Post: AI-Driven Malware Campaign Targets India with Mass-Produced Implants

Related Posts

Microsoft Confirms Windows 11 25H2 UI Features Broken Along With 24H2 Following Update Microsoft Confirms Windows 11 25H2 UI Features Broken Along With 24H2 Following Update Cyber Security News
Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster  3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster  Cyber Security News
AI-based Red Team Toolkit for Penetration Testing With Nmap and Metasploit AI-based Red Team Toolkit for Penetration Testing With Nmap and Metasploit Cyber Security News
Threat Modeling for DevSecOps Practical Guide Threat Modeling for DevSecOps Practical Guide Cyber Security News
Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit
  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit
  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark