A protracted-term and ongoing marketing campaign attributed to a China-nexus menace actor has embedded itself in telecom networks to conduct espionage towards authorities networks.
The strategic positioning exercise, which entails implanting and sustaining stealthy entry mechanisms inside essential environments, has been attributed to Crimson Menshen, a menace cluster that is additionally tracked as Earth Bluecrow, DecisiveArchitect, and Crimson Dev 18. The group has a monitor document of putting telecom suppliers throughout the Center East and Asia since a minimum of 2021.
Rapid7 described the covert entry mechanisms as “among the stealthiest digital sleeper cells” ever encountered in telecommunications networks.
The marketing campaign is characterised by means of kernel-level implants, passive backdoors, credential-harvesting utilities, and cross-platform command frameworks, giving the menace actor the power to persistently inhabit networks of curiosity. One of the crucial acknowledged instruments in its malware arsenal is a Linux backdoor known as BPFDoor.
“Not like standard malware, BPFdoor doesn’t expose listening ports or preserve seen command-and-control channels,” Rapid7 Labs mentioned in a report shared with The Hacker Information. “As an alternative, it abuses Berkeley Packet Filter (BPF) performance to examine community site visitors immediately contained in the kernel, activating solely when it receives a particularly crafted set off packet.”
“There is no such thing as a persistent listener or apparent beaconing. The result’s a hidden trapdoor embedded inside the working system itself.”
The assault chains start with the menace actor concentrating on internet-facing infrastructure and uncovered edge providers, reminiscent of VPN home equipment, firewalls, and web-facing platforms related to Ivanti, Cisco, Juniper Networks, Fortinet, VMware, Palo Alto Networks, and Apache Struts, to acquire preliminary entry.
Upon gaining a profitable foothold, Linux-compatible beacon frameworks reminiscent of CrossC2 are deployed to facilitate post-exploitation actions. Additionally dropped are Sliver, TinyShell (a Unix backdoor), keyloggers, and brute-force utilities to facilitate credential harvesting and lateral motion.
Central to Crimson Menshen’s operations, nevertheless, is BPFDoor. It options two distinct parts: One is a passive backdoor deployed on the compromised Linux system to examine incoming site visitors for a predefined “magic” packet by putting in a BPF filter and spawning a distant shell upon receiving such a packet. The opposite integral a part of the framework is a controller that is administered by the attacker and is answerable for sending the specifically formatted packets.
“The controller can be designed to function inside the sufferer’s atmosphere itself,” Rapid7 defined. “On this mode, it could possibly masquerade as professional system processes and set off further implants throughout inside hosts by sending activation packets or by opening a neighborhood listener to obtain shell connections, successfully enabling managed lateral motion between compromised programs.”
What’s extra, sure BPFDoor artifacts have been discovered to assist the Stream Management Transmission Protocol (SCTP), doubtlessly enabling the adversary to watch telecom-native protocols and achieve visibility into subscriber conduct and site, and even monitor people of curiosity.
These facets reveal that the performance of BPFdoor goes past a stealthy Linux backdoor. “BPFdoor capabilities as an entry layer embedded inside the telecom spine, offering long-term, low-noise visibility into essential community operations,” the safety vendor added.
It does not finish there. A beforehand undocumented variant of BPFdoor incorporates architectural modifications to make it extra evasive and keep undetected for extended durations in trendy enterprise and telecom environments. These embrace concealing the set off packet inside seemingly professional HTTPS site visitors and introducing a novel parsing mechanism that ensures the string “9999” seems at a set byte offset inside the request.
This camouflage, in flip, permits the magic packet to remain hidden inside HTTPS site visitors and keep away from inflicting shifts to the place of information contained in the request, and permits the implant to all the time examine for the marker at a particular byte offset and, if it is current, interpret it because the activation command.
The newly found pattern additionally debuts a “light-weight communication mechanism” that makes use of the Web Management Message Protocol (ICMP) for interacting between two contaminated hosts.
“These findings mirror a broader evolution in adversary tradecraft,” Rapid7 mentioned. “Attackers are embedding implants deeper into the computing stack — concentrating on working system kernels and infrastructure platforms fairly than relying solely on user-space malware.”
“Telecom environments — combining bare-metal programs, virtualization layers, high-performance home equipment, and containerized 4G/5G core parts — present preferrred terrain for low-noise, long-term persistence. By mixing into professional {hardware} providers and container runtimes, implants can evade conventional endpoint monitoring and stay undetected for prolonged durations.”


