Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
    Cybersecurity

    Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

    adminBy adminMarch 27, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    China APT disrupted
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A China-linked state-sponsored threat actor has deployed kernel implants and passive backdoors deep within telecommunication backbone infrastructure worldwide for long-term persistence, Rapid7 reports.

    The stealth digital sleeper cells have not been attributed to any known APT but are meant for high-level espionage, including against government networks, the cybersecurity firm says.

    The persistent tools were deployed as part of apparent discreet breaches that are characterized by recurring elements, suggesting an ongoing operation aimed at “embedding stealthy access mechanisms deep inside telecom and critical environments” for extended access.

    As part of its investigation, Rapid7 uncovered passive backdoors and kernel-level implants that have been used in combination with credential harvesters and cross-platform command frameworks.

    “Together, these components form a persistent access layer designed not simply to breach networks, but to inhabit them,” the cybersecurity firm warns.

    One of the central pieces of the campaign is BPFdoor, a stealthy Linux backdoor that was publicly detailed in 2021, and which uses Berkeley Packet Filter (BPF) functionality for packet inspection within the kernel, reacting to specific packets only.

    Advertisement. Scroll to continue reading.

    As part of the analyzed intrusions, public-facing applications and valid accounts were abused for initial access. The state-sponsored hackers targeted Ivanti, Cisco, Fortinet, VMware, and Palo Alto Networks appliances, as well as Apache Struts and other web-facing platforms.

    At the next step, the hackers deployed Linux beacon frameworks such as CrossC2, a Cobalt Strike-derived beacon often used by Chinese APTs for staging, command execution, and lateral movement.

    For persistence, the intruders often deploy the open source passive backdoor framework TinyShell. SSH brute-forcers and custom keyloggers are also deployed, along with “brute-force utilities containing pre-populated credential lists tailored for telecom environment,” Rapid7 says.

    The BPFDoor, which had its source code leaked online in 2022, is deployed in the Linux kernel and remains dormant, inspecting network traffic using the BPF filter. When a specific magic byte sequence is received inside a crafted packet, the backdoor spawns a bind shell or reverse shell.

    Rapid7 observed several BPFdoor samples used in the wild, all ELF files, although Solaris variants also exist, and released a scanner to help defenders identify potential infections.

    Some BPFdoor samples, the cybersecurity firm says, can mimic bare-metal infrastructure, posing as legitimate enterprise platforms to blend into operational noise. Others were seen spoofing core containerization components.

    In newer variants, the backdoor trigger is embedded within seemingly legitimate HTTPS traffic, and the attackers are carefully padding the request so that their marker always “lands exactly at the 26th byte offset of the inspected data structure,” which the implant checks.

    “The updated variant combines encrypted HTTPS triggers, proxy-aware command delivery, application-layer camouflage techniques, ICMP-based control signals, and kernel-level packet filtering to bypass multiple layers of modern network defenses,” Rapid7 notes.

    The cybersecurity firm underlines that BPFdoor’s capabilities make it more threatening than a typical, stealthy backdoor, turning it into an access layer to telecom backbone infrastructure.

    “Rather than targeting individual servers, the operators appear to focus on the underlying platforms that power modern telecommunication networks: bare-metal systems running telecom workloads, cloud-native Kubernetes environments hosting Containerized Network Functions, and the signaling protocols that coordinate subscriber identity, mobility, and communication flows,” Rapid7 notes.

    This is not the first time Chinese hackers have been caught deep inside critical infrastructure. In early 2024, CISA confirmed that Volt Typhoon had been “pre-positioning” across US organizations, only months after Mandiant warned of the hacking group being “clearly dug in”.

    In 2024, the networks of nine US telecom firms were hacked by Salt Typhoon, a Chinese state-sponsored group that continued targeting telecoms providers in 2025.

    Related: FCC Bans New Routers Made Outside the US Over National Security Risks

    Related: EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations

    Related: Google Disrupts Chinese Hackers Targeting Telecoms, Governments

    Related: Singapore: Rootkits, Zero-Day Used in Chinese Attack on Major Telecom Firms

    Backbone Caught Chinese Deep hackers infrastructure Telecom
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWill Google replace your landing pages with AI versions?
    Next Article Motorola’s Razr Ultra successor could feature a small change, and we hope it’s worth it
    admin
    • Website

    Related Posts

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google AI director outlines new content playbook

    April 16, 2026

    This 55-Inch LG OLED TV Is Nearly Half Off Right Now

    April 16, 2026

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,342)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (823)
    • Tech Tools & Mobile / Apps (1,606)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google AI director outlines new content playbook

    April 16, 2026

    This 55-Inch LG OLED TV Is Nearly Half Off Right Now

    April 16, 2026

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026
    Most Popular
    • Google AI director outlines new content playbook
    • This 55-Inch LG OLED TV Is Nearly Half Off Right Now
    • 4 reasons I use a 19-year-old app to copy and move files in Windows
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.