Malware campaign targeting telecom networks reported by Cisco Talos researchers

Security researchers have uncovered a complex cyber operation targeting telecommunications infrastructure with newly identified malware tools. The campaign, active since 2024, focuses on telecom providers and critical network systems that support internet connectivity and digital communication services.

Investigators found that the attackers used multiple malware families working together to gain access to systems, maintain hidden control, and convert compromised devices into tools for further cyber intrusions. The operation targeted Windows systems, Linux servers, and network edge devices that play a key role in handling large volumes of data traffic within telecom environments.

Hidden Backdoor Malware Expands Network Access

One of the main components of the campaign is a newly discovered backdoor known as TernDoor. This malicious software appears to be related to an earlier strain called CrowDoor and is designed to secretly give attackers remote access to infected systems.

To deploy the malware, attackers used a technique known as DLL side-loading. In this approach, a legitimate application loads a malicious library file without detecting that it has been altered. In the observed attacks, a trusted executable file called wsprint.exe was used to load a malicious DLL named BugSplatRc64.dll.

Cyberattacks disrupt Danish services as pro-Russian hackers pressure government over Ukraine

Once executed, the malicious file decrypts another hidden payload and launches it directly in the system’s memory. Running malicious software in memory reduces the chances of detection because fewer traces are left on the device’s storage.

After activation, the backdoor can collect system information, execute commands, create processes, and read or modify files. It also connects to a remote command server where attackers can send instructions and control the infected machine.

Researchers also identified an encrypted Windows driver linked to the malware called WSPrint.sys. This driver can suspend, resume, or terminate running processes on the system. Such capabilities may allow the attackers to interfere with monitoring tools or security software.

To ensure that the malicious software continues operating after a system restart, persistence mechanisms were used. These include scheduled tasks and registry entries that automatically relaunch the malware when the device starts or when a user logs in.

Peer-to-Peer Backdoor Targets Linux and Embedded Devices

Alongside TernDoor, researchers discovered another backdoor called PeerTime. This tool is designed to operate primarily on Linux systems and embedded devices commonly used within telecom infrastructure.

PeerTime differs from many traditional malware tools because it uses the BitTorrent protocol for communication. Instead of relying on a central command server, the malware exchanges instructions through peer-to-peer connections between infected systems.

This decentralized communication method can make the malware more resilient and difficult to track. If one node in the network is removed, others may continue operating and sharing commands.

CISA warns China-linked hacking group continues long-running campaign against 80 countries

Another notable feature of PeerTime is its compatibility with several CPU architectures. This allows the malware to operate across different hardware types, including devices that manage network routing, switching, or traffic control.

Researchers also observed debugging messages written in Simplified Chinese within the malware code. These technical indicators suggest that Chinese-speaking operators may have developed or deployed the tools used in the campaign.

BruteEntry Converts Compromised Devices into Attack Platforms

The third tool used in the campaign is called BruteEntry, which plays a different role from the other malware families. While the backdoors focus on gaining and maintaining access, BruteEntry turns infected machines into active attack systems.

BruteEntry is written in the Go programming language and functions as a brute-force scanning tool. It is typically deployed on network edge devices that connect telecom networks to external internet infrastructure.

Once installed, the malware transforms the infected device into what researchers describe as an Operational Relay Box, or ORB. These ORBs act as proxy nodes that attackers can use to conduct scanning and password-guessing attacks against other systems.

After registering with a command server, the malware receives lists of targets that include IP addresses and the services to attack. It then attempts to log in to those services using built-in credential combinations.

The services targeted by the malware include commonly used platforms such as SSH servers, PostgreSQL databases, and Apache Tomcat systems. When successful logins occur, the malware reports the results back to the command infrastructure.

Norway uncovers massive rare earth reserves in strategic blow to China dominance

This approach allows attackers to use compromised telecom equipment as launching points for additional cyber activity. By distributing attacks across many infected machines, the operation can hide the original source of the activity and expand its reach across different networks.

Security analysts also noted similarities between this campaign and techniques previously associated with other known cyber espionage groups. However, researchers stated that no confirmed connection has yet been established with certain other widely discussed threat operations.

TOP 10 TRENDING ON NEWSINTERPRETATION

Pune International Centre hosts discussion on Iran conflict highlighting India strategic role

A thought-provoking discussion in Pune brought attention to the...

From 126k to 70k: Why the Bitcoin crash cost Donald Trump 1.6 billion in personal wealth

A major financial move into cryptocurrency has drawn widespread...

Digital Armageddon? Claude Mythos strips away 30 years of internet security in three days

A major artificial intelligence company, Anthropic, has introduced a...

Russian disinformation group Storm 1516 targets Tisza Party with fake Jeffrey Epstein documents

A fresh wave of disinformation has surfaced during the...

Valeria Chomsky admits grave mistake and says Jeffrey Epstein was a Trojan horse for the couple

The recent release of private communications has sparked a...

Bab al-Mandab Strait Emerges as a Critical Chokepoint, Turning Globalization into a Vulnerable Artery

“Major shipping companies have started to reroute their vessels...

Donald Trump ousts Pam Bondi as Karl Rove points to growing frustration over stalled Epstein probe

Karl Rove brought renewed attention to the handling of...

DeFi giant Drift Protocol loses nearly half of total value locked in coordinated cyberattack

A major cyberattack has struck the decentralised finance platform...

Related Articles

Popular Categories