Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Samsung AI-RAN demo signals telecom cloud shift at MWC 2026

    March 6, 2026

    Macworld Podcast: MacBook Neo, iPhone 17e, M5 Pro and M5 Max, and more new Apple products

    March 6, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Chinese state hackers target telcos with new malware toolkit
    IT/ Cybersecurity

    Chinese state hackers target telcos with new malware toolkit

    big tee tech hubBy big tee tech hubMarch 6, 2026003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Chinese state hackers target telcos with new malware toolkit
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Chinese state hackers target telcos with new malware toolkit

    A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices.

    According to Cisco Talos researchers, the adversary is closely associated with the FamousSparrow and Tropic Trooper hacker groups, but is tracked as a separate activity cluster.

    This assessment has high confidence and is based on similar tooling, tactics, techniques, and procedures (TTPs), and victimology observed in attacks attributed to the threat actors.

    The researchers note that while UAT-9244 shares the same target profile as Salt Typhoon, they could not establish a solid connection between the two activity clusters.

    New malware targeting telco networks

    The researchers found that the campaign used three previously undocumented malware families: TernDoor, a Windows backdoor; PeerTime, a Linux backdoor that uses BitTorrent; and BruteEntry, a brute-force scanner that builds proxy infrastructure (ORBs).

    TernDoor is deployed through DLL side-loading, using the legitimate executable wsprint.exe to load malicious code from BugSplatRc64.dll, which decrypts and executes the final payload in memory (injected into msiexec.exe).

    The malware contains an embedded Windows driver, WSPrint.sys, which is used to terminate, suspend, and resume processes.

    Persistence is achieved via scheduled tasks and Windows Registry modifications, which are also used to hide the scheduled task.

    Additionally, TernDoor can execute commands via remote shell, run arbitrary processes, read/write files, collect system information, and self-uninstall.

    PeerTime is an ELF Linux backdoor that targets multiple architectures (ARM, AARCH, PPC, MIPS), suggesting it was designed to compromise a broad range of embedded systems and network devices used in telecom environments.

    PeerTime installation flow
    PeerTime installation flow
    Source: Cisco Talos

    Cisco Talos documented two versions for PeerTime. One variant is written in C/C++ and the other is based on Rust. The researchers also noticed Simplified Chinese debug strings in the instrumentor binary, an indicator of its origin.

    Its payload is decrypted and loaded in memory, and its process is renamed to appear legitimate.

    PeerTime, an ELF-based peer-to-peer (P2P) backdoor, uses the BitTorrent protocol for command-and-control (C2) communications, downloads and executes payloads from peers, and uses BusyBox to write the files on the host.

    Finally, there’s BruteEntry, which consists of a Go-based instrumentor binary and a brute-forcing component. Its role is to turn compromised devices into scanning nodes, known as Operational Relay Boxes (ORBs).

    BruteEntry infection chain
    BruteEntry infection chain
    Source: Cisco Talos

    The attacker uses the machines running BruteEntry to scan for new targets and brute-force access to SSH, Postgres, and Tomcat. Login attempt results are sent back to the C2 with task status and notes.

    In a technical report today, Cisco Talos researchers provide details on the capabilities of the three pieces of malware, how they are deployed, and achieve persistence.

    Cisco Talos researchers have listed indicators of compromise (IoCs) associated with the observed UAT-9244 activity, which defenders can use to detect and block these attacks early.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Chinese hackers Malware State target Telcos Toolkit
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

    March 5, 2026

    Who is the Kimwolf Botmaster “Dort”? – Krebs on Security

    March 4, 2026

    This month in security with Tony Anscombe – February 2026 edition

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Samsung AI-RAN demo signals telecom cloud shift at MWC 2026

    March 6, 2026

    Macworld Podcast: MacBook Neo, iPhone 17e, M5 Pro and M5 Max, and more new Apple products

    March 6, 2026

    Stop Paving the Cowpath: Why Agentic-First Is the Only Way to Build for the Enterprise

    March 6, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Samsung AI-RAN demo signals telecom cloud shift at MWC 2026

    March 6, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.