Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Cyber Attacks Target South American Telecoms

China-Linked Cyber Attacks Target South American Telecoms

Posted on March 6, 2026 By CWS

China-linked advanced persistent threat (APT) groups have been intensifying their cyber campaigns against telecommunications networks in South America since 2024. These cyber adversaries have been deploying sophisticated malware across Windows, Linux, and network edge devices, according to cybersecurity insights from Cisco Talos.

Identifying the Cyber Threat Actors

The threat is primarily attributed to a group tracked as UAT-9244 by Cisco Talos, which shares tactical similarities with the FamousSparrow group. FamousSparrow itself is known to be linked with Salt Typhoon, another espionage entity with ties to China. Despite these connections, definitive evidence linking UAT-9244 directly to Salt Typhoon remains elusive.

The analysis by Cisco Talos highlights the deployment of three novel malware strains: TernDoor, PeerTime, and BruteEntry. These are used to infiltrate and control systems running varying operating systems and devices, further underlining the sophistication of these attacks.

Technical Breakdown of the Malicious Implants

TernDoor, one of the identified malware strains, specifically targets Windows systems. It uses a technique called DLL side-loading, exploiting legitimate executables to execute malicious payloads stealthily. This backdoor, in operation since November 2024, maintains persistence through scheduled tasks or registry keys and includes unique features like a Windows driver to control process states.

On the Linux front, the PeerTime backdoor introduces a peer-to-peer approach, compiled for multiple architectures such as ARM and MIPS. Its deployment involves a shell script that checks for Docker installations, subsequently executing the malware if Docker is detected. PeerTime variants, written in both C/C++ and Rust, use the BitTorrent protocol to communicate with command-and-control (C2) servers.

Network Edge Devices Under Siege

The cyber threat extends to network edge devices through the use of BruteEntry, a tool designed to transform these devices into proxy nodes. By leveraging a shell script, the attackers deploy Golang-based components to initiate brute-force attacks on various servers like Postgres and SSH. Successful intrusions report back to the C2 infrastructure, highlighting the threat’s operational focus on widespread network compromise.

Conclusion: Ongoing Vigilance Required

The persistent threat posed by these China-linked cyber operations underscores the need for ongoing vigilance and enhanced cybersecurity measures within the telecommunications sector. As cyber threats evolve, organizations must remain proactive in their defenses to safeguard critical infrastructure from sophisticated adversaries.

The Hacker News Tags:APT, China, Cisco Talos, cyber espionage, Cybersecurity, FamousSparrow, Linux, Salt Typhoon, Telecom, threat intelligence, UAT-9244, Windows

Post navigation

Previous Post: Google Reports 90 Zero-Day Exploits in 2025
Next Post: Critical Security Flaws in Hikvision and Rockwell Products

Related Posts

SystemBC Server Uncovers 1,570 Victims in Ransomware Operation SystemBC Server Uncovers 1,570 Victims in Ransomware Operation The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News
U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems The Hacker News
Critical n8n Vulnerabilities Risk Remote Code Execution Critical n8n Vulnerabilities Risk Remote Code Execution The Hacker News
North Korean Hackers Launch 1,700 Malicious Packages North Korean Hackers Launch 1,700 Malicious Packages The Hacker News
Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark