Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Hackers Target Telecoms With New Malware

China-Linked Hackers Target Telecoms With New Malware

Posted on March 6, 2026 By CWS

A China-linked hacking group has been systematically targeting telecommunications companies across South America since 2024. This group, known as UAT-9244, is deploying a trio of new malware implants to penetrate critical network infrastructure.

Targeting Telecommunications Infrastructure

UAT-9244, an advanced persistent threat (APT) group, has focused its efforts on both Windows and Linux-based systems, as well as on network edge devices essential for telecom operations. These attacks are characterized by their strategic approach to compromising and expanding control over these networks.

The group’s arsenal includes three distinct malware tools. TernDoor, a Windows backdoor, is a new iteration of the previously documented CrowDoor malware. PeerTime, a Linux-based tool, utilizes the BitTorrent protocol for communication, blending in with legitimate network traffic. BruteEntry, the third tool, transforms compromised devices into relay boxes that brute-force access to various servers.

Links to Known APT Groups

Cisco Talos researchers have connected UAT-9244 with other China-nexus APTs like FamousSparrow and Tropic Trooper. This connection is based on shared tools, tactics, and targeted victims. TernDoor, for example, can trace its lineage back to SparrowDoor, associated with FamousSparrow.

Furthermore, the PeerTime tool contains debug strings in Simplified Chinese, indicating the involvement of Chinese-speaking threat actors. The operation’s extensive infrastructure includes a shared SSL certificate linked to multiple IP addresses, showcasing a well-resourced network.

Malware Techniques and Mitigation

TernDoor’s deployment involves DLL side-loading, where a benign executable loads a malicious file. This method allows the malware to evade file-based detection. Once active, TernDoor injects itself into a Windows process, executes remote commands, and communicates with its operator.

To maintain persistence, TernDoor creates scheduled tasks and alters registry keys. It also installs a Windows driver that can disable security tools. Security teams are advised to audit system tasks, monitor for DLL side-loading, and block known C2 IP addresses as part of their defense strategy.

The ongoing threat posed by UAT-9244 underscores the importance of robust cybersecurity measures in the telecommunications sector. By understanding and mitigating these sophisticated attacks, organizations can better protect their critical infrastructure.

Cyber Security News Tags:APT, BruteEntry, China-linked Hackers, Cybersecurity, Malware, network security, PeerTime, Telecommunications, TernDoor, UAT-9244

Post navigation

Previous Post: FBI Security Breach, Iranian Camera Hack, and More Cyber Developments
Next Post: AI-Driven Malware Campaign Targets India with Mass-Produced Implants

Related Posts

Angular Platform Vulnerability Allows Malicious Code Execution Via Weaponized SVG Animation Files Angular Platform Vulnerability Allows Malicious Code Execution Via Weaponized SVG Animation Files Cyber Security News
How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach Cyber Security News
PylangGhost RAT Targets Developers via npm Packages PylangGhost RAT Targets Developers via npm Packages Cyber Security News
Sendmarc Appoints Dan Levinson as Customer Success Director in North America Sendmarc Appoints Dan Levinson as Customer Success Director in North America Cyber Security News
What Is Out-of-Bounds Read and Write Vulnerability? What Is Out-of-Bounds Read and Write Vulnerability? Cyber Security News
Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark