New whitepaper reveals stealthy BPFDoor variants using custom BPF filters, ICMP PTY tunnels with RC4 key “icmp”, and NTP-over-SSL beaconing domains for covert C2 and persistence. #BPFDoor #ProtocolTunneling #UnitedStates
Versteckte Linux-Malware in Telko-Netzwerken entdeckt
glm.io/207004?n #Cybercrime #Malware #BPFDoor #Linux
Versteckte Linux-Malware in Telko-Netzwerken entdeckt
https://glm.io/207004?n #Cybercrime #Malware #BPFDoor #Linux
🇨🇳 China-linked APT 'Red Menshen' is planting stealthy BPFDoor backdoors in global telecom networks. The malware creates 'digital sleeper cells' for long-term espionage. 📡 #APT #BPFDoor #CyberEspionage
China-linked hackers plant stealth malware deep in global telecom networks: Report yespunjab.com?p=233499
#CyberSecurity #ChinaHackers #BPFdoor #TelecomSecurity #CyberThreat #Rapid7 #DataSecurity #GlobalTech #Hacking #DigitalEspionage #TechNews #BreakingNews
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks reconbee.com/china-linked...
#china #chinese #RedMenshen #BPFDoor #spy #telecomnetwork #potatoattack
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks reconbee.com/china-linked...
#china #chinese #RedMenshen #BPFDoor #spy #telecomnetwork #cyberattack
China-linked group Red Menshen uses BPFDoor, a stealthy Linux backdoor exploiting Berkeley Packet Filter, to implant sleeper cells in telecom networks for covert espionage on government and subscriber systems. #RedMenshen #BPFDoor #China
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks A sophisticated and ongoing cyber espionage campaign linked to a Chinese threat actor has been discovered infiltr...
#Cyber #Security #BPFDoor #ChinaLinked #Implants […]
[Original post on capalearning.com]
Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage. The post...
#Nation-State #backdoor #BPFDoor #China #APT #malware […]
[Original post on securityweek.com]
Linux Systems Under Attack from BPFDoor and Symbiote Rootkits Exploiting eBPF Filters Linux systems are increasingly being targeted by advanced rootkits that exploit BPF and eBPF filters to hide th...
#Cyber #Security #News #Linux #BPFDoor #and #Symbiote #rootkits
Origin | Interest | Match
As usual, @haxrob's reporting on Linux malware really is excellent:
* https://haxrob.net/bpfdoor-past-and-present-part-1/
* https://haxrob.net/bpfdoor-past-and-present-part-2/
More proof if it were needed that Linux targetting threat actors have been hanging around for the last decade or two […]
Since we are taking a closer look at #BPFDoor, let's do a bit of digging. Remember this hard coded epoch timestamp used for tampering it's file modified time- October 30, 2008 ?
(6/21)
Newer variants of the #BPFDoor has an interesting modification made that avoids detections looking for processes with raw sockets. The kernel reports SOCK_DGRAM rather then rather loud "SOCK_RAW". Here we have a sample found in the recent SK telco breach.
(1/21)
AhnLab Detection Information on BPFDoor Exploited in Recent Hacking Attacks and KISA Hash Notice ...
https://asec.ahnlab.com/en/87863/
#Malware #Public #backdoor #BPF #BPFDoor #리눅스 #백도어 #침해사고 #해킹 #Linux
Result Details
SKT 해킹 실제 악성코드 사용? 중국 해커의 리눅스 백도어 BPFDoor 분석
wezard4u.tistory.com/429473
#해킹 #SKT #it #보안 #BPFDoor #bpfdoor #리눅스 #백도어
New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks reconbee.com/new-bpfdoor-...
#BPFDoor #linuxserverattacks #linuxservers #cyberattack #CyberSecurity #CyberSecurityAwareness
Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild In recent attacks, the state-sp...
www.securityweek.com/enhanced-version-of-bpfd...
#Malware #& #Threats #backdoor #BPFDoor #China #malware
Event Attributes
#BPFDoor malware's hidden controller targets Asia/Middle East—evades detection via BPF filters for stealthy C2.
Full analysis: www.trendmicro.com/en_us/resear... #CyberEspionage #APT
BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks
gbhackers.com/bpfdoor-malw...
#Infosec #Security #Cybersecurity #CeptBiro #BPFDoor #Malware #ReverseShell #CompromisedNetworks
bpfdoor sfrutta filtri bpf nel kernel linux per eludere i controlli di rete in attacchi apt attribuiti a red menshen in asia e medio oriente
#apt #bpfdoor #cyberspionaggio #earthbluecrow #guerracibernetica #Linux #magicpacket #malware #redmenshen
www.matricedigitale.it/sicurezza-in...
In our latest research, we took a deep dive into how a #BPFDoor controller found in a recently targeted company operates. This threat actor has been active for years, targeting #Linux servers of interest (mostly from telcos, but also from other sectors). 🐧 www.trendmicro.com/en_us/resear...
Stealthy and persistent: #BPFdoor is back, slipping past defenses with almost no trace. Learn how this elusive Linux backdoor hides in plain sight and what it means for enterprise security. Full analysis by @TrendMicro: www.trendmicro.com/en_us/research/25/d/bpfd...