Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks
CyberSecurity News

Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks

A months-long investigation by Rapid7 Labs has exposed a sophisticated, state-sponsored espionage campaign perpetrated by the China-nexus threat actor Red Menshen. This group embedded some of the...

David kimber
David kimber
March 26, 2026 3 Min Read
0 0

A months-long investigation by Rapid7 Labs has exposed a sophisticated, state-sponsored espionage campaign perpetrated by the China-nexus threat actor Red Menshen. This group embedded some of the most covert digital sleeper cells ever documented inside global telecommunications infrastructure.

Released on March 26, 2026, the findings reveal a deliberate shift from opportunistic hacking to long-term pre-positioning within the very backbone networks that underpin national and international communications.

Telecommunications networks carry government communications, authenticate subscriber identities, coordinate critical industries, and process signaling flows across national borders.

At their core, these environments rely on specialized protocols such as SS7, Diameter, and SCTP to manage subscriber identity, mobility, and global connectivity, making them uniquely valuable for intelligence collection far beyond what a conventional data breach enables.

Persistent access within a telecom core can expose subscriber identifiers, mobility events, authentication exchanges, and communication metadata, enabling large-scale tracking of high-value geopolitical targets.

Red Menshen has specifically targeted telecom providers across South Korea, Hong Kong, Myanmar, Malaysia, Egypt, and the Middle East, with collateral risk extending to government networks that depend on those carriers.

BPFdoor: A Kernel-Level Trapdoor

At the center of this campaign is BPFdoor, a stealth Linux backdoor engineered to operate within the operating system kernel by abusing Berkeley Packet Filter (BPF) functionality.

Unlike conventional malware, BPFdoor does not open listening ports or generate visible command-and-control beaconing. Instead, it installs a custom BPF filter inside the kernel that silently inspects incoming traffic, activating only when it receives a specially crafted “magic packet” containing a predefined byte sequence. Tools such as netstat, ss, or nmap show nothing unusual; the system appears entirely clean.

Rapid7 Labs identified a previously undocumented BPFdoor variant that significantly advances its stealth capabilities. Rather than relying on a detectable magic packet, the updated variant now conceals command triggers within legitimate HTTPS traffic, exploiting SSL termination points like load balancers and reverse proxies to deliver activation commands after decryption in the internal network zone.

A sophisticated “magic ruler” padding mechanism ensures a marker string (“9999”) always lands at a fixed 26-byte or 40-byte offset within inspected request data, allowing the implant to survive proxy header rewriting, effectively creating dynamic Layer-7 camouflage.

The variant also employs an ICMP-based control channel, where compromised servers relay commands to each other using crafted ICMP packets embedded with the value 0xFFFFFFFF as a “do not forward” terminal signal, enabling lateral propagation without standard C2 traffic.

Infrastructure-Level Masquerading

Some BPFdoor samples mimic legitimate processes on HPE ProLiant bare-metal servers, specifically impersonating hpasmlited, a daemon belonging to HPE’s Agentless Management Service, to blend into telecom hardware environments running 4G/5G core workloads.

Other samples spoof Docker and containerd components, targeting Kubernetes-hosted 5G core functions such as AMF, SMF, and UDM.

Initial access consistently targets edge infrastructure: Ivanti Connect Secure VPNs, Cisco and Juniper network devices, Fortinet firewalls, and VMware ESXi hosts. Post-exploitation tooling includes CrossC2, TinyShell, SSH brute-forcers, and custom ELF keyloggers with telecom-aware credential lists referencing terms like “imsi.”

Rapid7 has coordinated with national CERTs and government partners to notify affected organizations. The firm released a free, open-source scanning script capable of detecting both legacy and new BPFdoor variants to assist organizations in rapid exposure validation.

Defenders are strongly advised to expand visibility into kernel-level operations, raw BPF filter activity, and anomalous high-port behavior on Linux systems — areas where most organizations currently lack adequate monitoring depth.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

BreachExploitHackerMalwareThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

LeakBase Hacker Forum Admin Arrested in Russia Enforcement Authorities

Next Post

CISA: Langflow Code Injection Vulnerability Act Warns Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us