Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked Red Mensheng uses stealth BPF door implant to spy via communications network

First Hydrogen expands contract to advance next-generation unmanned ground vehicles

NASA outlines phased moon base strategy

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked Red Mensheng uses stealth BPF door implant to spy via communications network
Identity

China-linked Red Mensheng uses stealth BPF door implant to spy via communications network

By March 26, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A long-term, ongoing campaign attributed to threat actors linked to China has integrated communications networks to conduct espionage against government networks.

This strategic location effort to embed and maintain stealth access mechanisms within critical environments is believed to be the work of Red Menshen, a threat cluster also tracked as Earth Bluecrow, DecisiveArchitect, and Red Dev 18. The group has a track record of attacking telecommunications providers in the Middle East and Asia since at least 2021.

Rapid7 described this covert access mechanism as “some of the stealthiest digital sleeper cells” ever encountered in telecommunications networks.

This campaign features the use of kernel-level implants, passive backdoors, credential harvesting utilities, and cross-platform command frameworks that allow threat actors to maintain persistent presence on targeted networks. One of the most well-known tools in its malware arsenal is a Linux backdoor called BPFDoor.

“Unlike traditional malware, BPFdoor does not expose listening ports or maintain visible command and control channels,” Rapid7 Labs said in a report shared with The Hacker News. “Instead, it exploits the Berkeley Packet Filter (BPF) feature to inspect network traffic directly within the kernel and only activates when a specially crafted trigger packet is received.”

“There are no persistent listeners or obvious beacons. The result is a hidden trapdoor embedded within the operating system itself.”

The attack chain begins with threat actors targeting and gaining initial access to internet-connected infrastructure and exposed edge services such as VPN appliances, firewalls, and web connectivity platforms associated with Ivanti, Cisco, Juniper Networks, Fortinet, VMware, Palo Alto Networks, and Apache Struts.

Once a foothold is established, a Linux-compatible beacon framework such as CrossC2 is deployed to facilitate post-exploitation activities. Also removed were Sliver, TinyShell (Unix backdoor), keyloggers, and brute force utilities to facilitate credential collection and lateral movement.

But at the heart of Red Menshen’s operations is BPFDoor. It features two different components. One is a passive backdoor deployed on compromised Linux systems that inspects incoming traffic for predefined “magic” packets by installing a BPF filter and spawning a remote shell upon receipt of such packets. Another important part of the framework is the controller, which is managed by the attacker and is responsible for sending specially formatted packets.

“The controller is designed to work within the victim’s environment itself,” Rapid7 explained. “In this mode, additional implants can be triggered across internal hosts by masquerading as legitimate system processes and sending activation packets or opening local listeners to receive shell connections, effectively allowing controlled lateral movement between compromised systems.”

Additionally, certain BPFDoor artifacts have been found to support Stream Control Transmission Protocol (SCTP), which could allow attackers to monitor communication native protocols, gain visibility into subscriber behavior and location, and even track individuals of interest.

These aspects demonstrate that BPFdoor’s capabilities go beyond a stealth Linux backdoor. “BPFdoor acts as an embedded access layer within the communications backbone, providing long-term, low-noise visibility into critical network operations,” the security vendor added.

That’s not the end. Previously undocumented variants of BPFdoor incorporate architectural changes that make them more evasive and undetectable for extended periods of time in modern corporate and communications environments. These include hiding trigger packets within seemingly legitimate HTTPS traffic and introducing a new parsing mechanism that ensures that the string “9999” appears at a fixed byte offset within the request.

This camouflage allows the magic packet to remain hidden within the HTTPS traffic, allowing it to avoid shifting the position of the data within the request, and allows the implant to constantly check for markers at specific byte offsets and interpret them, if present, as an activation command.

The newly discovered sample also debuts a “lightweight communication mechanism” that uses Internet Control Message Protocol (ICMP) for communication between two infected hosts.

“These findings reflect the broader evolution of adversarial tradecraft,” Rapid7 said. “Rather than relying solely on user-space malware, attackers are planting implants deep into the computing stack, targeting operating system kernels and infrastructure platforms.”

“A communications environment that combines bare-metal systems, virtualization layers, high-performance appliances, and containerized 4G/5G core components provides an ideal environment for low-noise, long-term persistence. By integrating with formal hardware services and container runtimes, implants can bypass traditional endpoint monitoring and remain undetected for long periods of time.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFirst Hydrogen expands contract to advance next-generation unmanned ground vehicles

Related Posts

Flaw in Claude extension enabled zero-click XSS prompt injection via arbitrary websites

March 26, 2026

How hackers and art forgers perfected the art of deception

March 26, 2026

PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

March 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked Red Mensheng uses stealth BPF door implant to spy via communications network

First Hydrogen expands contract to advance next-generation unmanned ground vehicles

NASA outlines phased moon base strategy

Conntour raises $7M from YC’s General Catalyst to build AI search engine for security video systems

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.