Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Stealthy BPFdoor Backdoors Threaten Telecom Networks

Stealthy BPFdoor Backdoors Threaten Telecom Networks

Posted on March 27, 2026 By CWS

An extensive investigation conducted by Rapid7 Labs has uncovered a sophisticated cyber espionage operation orchestrated by Red Menshen, a threat actor linked to China. This group has embedded highly covert digital sleeper cells within global telecommunications infrastructures, marking a significant shift towards long-term strategic positioning.

Unveiled on March 26, 2026, the report highlights a transition from sporadic cyberattacks to entrenched operations within the crucial networks that form the backbone of both national and international communications.

Targeting Telecommunications Networks

The telecommunications sector is critical, managing government communications, subscriber identity verifications, and critical industry coordination. Networks rely on protocols such as SS7, Diameter, and SCTP, which are essential for managing global connectivity and subscriber mobility. This makes them prime targets for intelligence gathering far beyond the scope of a typical data breach.

By maintaining persistent access within telecom cores, attackers can potentially expose subscriber data, track mobility, and intercept authentication processes, posing significant risks for geopolitical monitoring. Red Menshen has focused its attacks on telecom providers across regions including South Korea, Hong Kong, Myanmar, Malaysia, Egypt, and the Middle East, with potential spillover effects on connected governmental networks.

The BPFdoor Backdoor Mechanism

Central to this campaign is a Linux-based backdoor known as BPFdoor, which operates stealthily at the kernel level by exploiting Berkeley Packet Filter (BPF) functionalities. Unlike traditional malware, BPFdoor avoids opening listening ports or generating noticeable command signals. It uses a custom BPF filter that discreetly monitors traffic, activating upon receiving a specific “magic packet.” This makes detection via tools like netstat or nmap challenging.

Rapid7 Labs has discovered an advanced variant of BPFdoor that enhances stealth by hiding command triggers within legitimate HTTPS traffic. This version uses SSL termination points for activation, ensuring the implant’s survival through proxy header modifications.

The new variant also employs an ICMP-based control channel, allowing compromised servers to relay commands using specially crafted ICMP packets. This technique supports lateral movement without conventional command-and-control traffic, enhancing the campaign’s stealth.

Infrastructure Mimicry and Defensive Measures

BPFdoor samples have been observed mimicking legitimate processes, such as HPE’s Agentless Management Service, to blend into telecom environments. Other samples target Kubernetes-hosted 5G core functions by impersonating Docker components.

Initial access vectors include edge infrastructure like Ivanti VPNs and network devices from Cisco, Juniper, and Fortinet, along with VMware ESXi hosts. Post-exploitation tools reported include CrossC2, TinyShell, and custom keyloggers tailored for telecom environments.

Rapid7 has coordinated with national CERTs to alert affected organizations and released a free open-source scanning tool to detect BPFdoor variants. Organizations are advised to enhance monitoring of kernel-level activities and unusual high-port behaviors on Linux systems to mitigate this threat effectively.

Stay updated with the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Reach out to share your cybersecurity insights and stories.

Cyber Security News Tags:Backdoors, BPFDoor, China-nexus, cyber threats, Cybersecurity, Espionage, kernel-level threats, Linux backdoor, Malware, network security, Rapid7, Red Menshen, state-sponsored attacks, telecom networks, Telecommunications

Post navigation

Previous Post: VoidLink Rootkit Exploits Linux with Advanced Techniques
Next Post: Silver Fox Shifts Tactics to Python-Based Threats in Asia

Related Posts

Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Cyber Security News
Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image Cyber Security News
Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Cyber Security News
Building a Scalable Cybersecurity Training Program Building a Scalable Cybersecurity Training Program Cyber Security News
SpyCloud Launches Supply Chain Identity Protection SpyCloud Launches Supply Chain Identity Protection Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent Patches for Critical NVIDIA Vulnerabilities Released
  • Silver Fox Shifts Tactics to Python-Based Threats in Asia
  • Stealthy BPFdoor Backdoors Threaten Telecom Networks
  • VoidLink Rootkit Exploits Linux with Advanced Techniques
  • Leak Bazaar Revolutionizes Stolen Data Sales with New Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent Patches for Critical NVIDIA Vulnerabilities Released
  • Silver Fox Shifts Tactics to Python-Based Threats in Asia
  • Stealthy BPFdoor Backdoors Threaten Telecom Networks
  • VoidLink Rootkit Exploits Linux with Advanced Techniques
  • Leak Bazaar Revolutionizes Stolen Data Sales with New Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark