Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

These countries are moving to ban social media for children

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked hackers use TernDoor, PeerTime, and BruteEntry in communications attacks in South America
Identity

China-linked hackers use TernDoor, PeerTime, and BruteEntry in communications attacks in South America

userBy userMarch 6, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 6, 2026Cyber ​​espionage/threat intelligence

China-linked advanced persistent threat (APT) attackers have been targeting critical communications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants.

This activity is being tracked by Cisco Talos as UAT-9244 and is described as being closely related to another cluster known as FamousSparrow.

It is noteworthy that FamousSparrow is assessed as having tactical overlap with Salt Typhoon, a Chinese-aligned spy group known for targeting telecommunications service providers. Despite the similar target footprints of UAT-9244 and Salt Typhoon, there is no conclusive evidence linking the two clusters.

The campaign, analyzed by a cybersecurity firm, found that the attack chain distributed three previously undocumented implants. TernDoor targets Windows, PeerTime (also known as Angrypeer) targets Linux, and BruteEntry installs on network edge devices.

Although the exact initial access method used in this attack is unknown, attackers have previously targeted systems running older versions of Windows Server and Microsoft Exchange Server to drop web shells for subsequent activity.

TernDoor is deployed through DLL sideloading, leveraging a legitimate executable file, ‘wsprint.exe’, to launch a malicious DLL (‘BugSplatRc64.dll’), which decrypts and executes the final payload in memory. This backdoor, a variant of Crowdoor (which is itself a variant of SparrowDoor), is said to have been used by UAT-9244 since at least November 2024.

Establish persistence on the host using a scheduled task or the registry Run key. It also differentiates itself from CrowDoor by utilizing a different set of command codes and embedding a Windows driver to pause, resume, and terminate processes. Additionally, only one command line switch (‘-u’) is supported to uninstall itself from the host and remove all associated artifacts.

Once launched, it performs a check to ensure that it has been injected into ‘msiexec.exe’ and then decodes the configuration and extracts the command and control (C2) parameters. It then establishes communication with the C2 server, allowing it to create processes, execute arbitrary commands, read/write files, gather system information, and deploy drivers that hide malicious components and manage processes.

Further analysis of UAT-9244’s infrastructure revealed a Linux peer-to-peer (P2P) backdoor known as PeerTime. It has been compiled for several architectures (i.e. ARM, AARCH, PPC, MIPS) to infect various embedded systems. ELF backdoors are deployed via shell scripts along with instrumenter binaries.

“The Instrumenter ELF binary uses docker and the docker –q command to check for the presence of Docker on the compromised host,” said Talos researchers Asheer Malhotra and Brandon White. “If Docker is found, the PeerTime loader is executed. The installer consists of a debug string in Simplified Chinese, indicating that it is a custom binary created and deployed by a Chinese-speaking attacker.”

The main purpose of the loader is to decrypt and decompress the final PeerTime payload and execute it directly in memory. There are two types of PeerTime. One version written in C/C++ and a new version programmed in Rust. In addition to having the ability to rename itself as a benign process to avoid detection, the backdoor uses the BitTorrent protocol to obtain C2 information, download files from peers, and execute them on the compromised system.

A series of shell scripts and payloads are also staged on the threat actor’s servers. This includes a brute force scanner codenamed BruteEntry that is installed on edge devices to turn the device into a mass-scanning proxy node in an operational relay box (ORB) capable of brute force attacks against Postgres, SSH, and Tomcat servers.

This is accomplished through a shell script that drops two Golang-based components. One is an orchestrator that provides a BruteEntry, which then connects to the C2 server to obtain a list of IP addresses on which to perform a brute force attack. The backdoor eventually reports a successful login to the C2 server.

“‘Success’ indicates whether the brute force was successful (true or false), and ‘notes’ provides specific information about whether the brute force was successful,” Talos said. “If the login fails, the note will say ‘All credentials have been tried.’ ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHigh-performance large language models for Europe
Next Article How Indaver became a pioneer in PFAS destruction
user
  • Website

Related Posts

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

March 6, 2026

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

March 6, 2026

MSP guide to scaling cybersecurity with AI-powered risk management

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

These countries are moving to ban social media for children

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

Is space weather hiding alien signals?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.