Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Hackers Target Telecoms With New Malware

China-Linked Hackers Target Telecoms With New Malware

Posted on March 6, 2026 By CWS

A China-linked hacking group has been systematically targeting telecommunications companies across South America since 2024. This group, known as UAT-9244, is deploying a trio of new malware implants to penetrate critical network infrastructure.

Targeting Telecommunications Infrastructure

UAT-9244, an advanced persistent threat (APT) group, has focused its efforts on both Windows and Linux-based systems, as well as on network edge devices essential for telecom operations. These attacks are characterized by their strategic approach to compromising and expanding control over these networks.

The group’s arsenal includes three distinct malware tools. TernDoor, a Windows backdoor, is a new iteration of the previously documented CrowDoor malware. PeerTime, a Linux-based tool, utilizes the BitTorrent protocol for communication, blending in with legitimate network traffic. BruteEntry, the third tool, transforms compromised devices into relay boxes that brute-force access to various servers.

Links to Known APT Groups

Cisco Talos researchers have connected UAT-9244 with other China-nexus APTs like FamousSparrow and Tropic Trooper. This connection is based on shared tools, tactics, and targeted victims. TernDoor, for example, can trace its lineage back to SparrowDoor, associated with FamousSparrow.

Furthermore, the PeerTime tool contains debug strings in Simplified Chinese, indicating the involvement of Chinese-speaking threat actors. The operation’s extensive infrastructure includes a shared SSL certificate linked to multiple IP addresses, showcasing a well-resourced network.

Malware Techniques and Mitigation

TernDoor’s deployment involves DLL side-loading, where a benign executable loads a malicious file. This method allows the malware to evade file-based detection. Once active, TernDoor injects itself into a Windows process, executes remote commands, and communicates with its operator.

To maintain persistence, TernDoor creates scheduled tasks and alters registry keys. It also installs a Windows driver that can disable security tools. Security teams are advised to audit system tasks, monitor for DLL side-loading, and block known C2 IP addresses as part of their defense strategy.

The ongoing threat posed by UAT-9244 underscores the importance of robust cybersecurity measures in the telecommunications sector. By understanding and mitigating these sophisticated attacks, organizations can better protect their critical infrastructure.

Cyber Security News Tags:APT, BruteEntry, China-linked Hackers, Cybersecurity, Malware, network security, PeerTime, Telecommunications, TernDoor, UAT-9244

Post navigation

Previous Post: FBI Security Breach, Iranian Camera Hack, and More Cyber Developments
Next Post: AI-Driven Malware Campaign Targets India with Mass-Produced Implants

Related Posts

Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Cyber Security News
Claude’s New Feature Simplifies AI Memory Transfer Claude’s New Feature Simplifies AI Memory Transfer Cyber Security News
North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data Cyber Security News
New Phishing Attack Leverages Popular Brands to Harvest Login Credentials New Phishing Attack Leverages Popular Brands to Harvest Login Credentials Cyber Security News
Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations Cyber Security News
Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News