Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Uses BPFDoor to Spy on Telecoms

China-Linked Group Uses BPFDoor to Spy on Telecoms

Posted on March 26, 2026 By CWS

An ongoing cyber espionage campaign linked to a Chinese threat actor has infiltrated telecommunications networks to conduct surveillance on government entities. This operation, attributed to the group known as Red Menshen, involves embedding persistent and stealthy access mechanisms within crucial communication infrastructures, primarily across the Middle East and Asia. Active since at least 2021, Red Menshen is also referred to as Earth Bluecrow, DecisiveArchitect, and Red Dev 18.

According to Rapid7, a cybersecurity firm, the group’s covert methods include some of the most discreet digital sleeper cells seen within telecom networks. The campaign employs a variety of sophisticated tools, such as kernel-level implants, hidden backdoors, credential-stealing utilities, and cross-platform command systems. A key component of their toolkit is a Linux backdoor known as BPFDoor.

BPFDoor: A Hidden Threat in Telecom Networks

BPFDoor distinguishes itself from traditional malware by avoiding the exposure of listening ports or apparent command-and-control channels. Instead, it leverages the Berkeley Packet Filter (BPF) to monitor network traffic directly within the kernel, activating only when it detects a specific trigger packet. This method creates an elusive backdoor within the operating system, going unnoticed by typical security measures.

The cyber attackers begin by targeting internet-facing components such as VPNs, firewalls, and web platforms from major providers like Cisco, Juniper Networks, and Fortinet. Once access is established, the attackers deploy Linux-compatible beacon frameworks such as CrossC2 to conduct further exploitation. Additional tools like Sliver, TinyShell, and various credential-harvesting mechanisms are also utilized to facilitate movement within the network.

The Role of BPFDoor in Red Menshen’s Strategy

Central to the operations of Red Menshen is BPFDoor, which functions through two primary components. The first is a passive backdoor installed on compromised systems to detect incoming traffic for a predefined packet, activating a remote shell upon receipt. The second component is a controller managed by the attackers, capable of sending specially formatted packets to activate implants or opening local listeners for shell connections.

Additionally, BPFDoor artifacts support the Stream Control Transmission Protocol (SCTP), allowing the adversaries to monitor telecom-specific protocols and potentially track individuals. This capability highlights BPFDoor’s function as more than just a backdoor; it acts as an access layer deeply embedded within telecom networks, providing long-term, low-noise monitoring capabilities.

Advanced Evasion Techniques and Implications

The discovery of a new BPFDoor variant reveals advanced evasion techniques, such as concealing trigger packets within legitimate HTTPS traffic and employing novel parsing mechanisms. These features allow BPFDoor to remain undetected in modern enterprise and telecom environments for extended periods.

Moreover, this variant introduces a lightweight communication method using the Internet Control Message Protocol (ICMP) for interactions between infected hosts. These developments indicate a significant evolution in cyber adversary tactics, with attackers embedding implants deeper into computing infrastructures, targeting operating system kernels over user-space malware.

The implications of such sophisticated cyber operations are profound, underscoring the vulnerabilities within telecom environments that combine diverse technological components. As threat actors blend into legitimate services and bypass traditional endpoint monitoring, the need for enhanced cybersecurity measures becomes increasingly critical.

The Hacker News Tags:BPFDoor, China, cyber attack, cyber espionage, cyber threat, Cybersecurity, Espionage, Linux, Malware, network security, Rapid7, Red Menshen, telecom security, Telecommunications, threat actor

Post navigation

Previous Post: Critical IDrive Windows Flaw Allows Privilege Escalation
Next Post: GhostClaw Malware Targets macOS Users with AI Tools

Related Posts

Wazuh for Regulatory Compliance Wazuh for Regulatory Compliance The Hacker News
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Hacker News
How Smart MSSPs Using AI to Boost Margins with Half the Staff How Smart MSSPs Using AI to Boost Margins with Half the Staff The Hacker News
New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site The Hacker News
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation
  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation
  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark