Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » China-linked hackers plant stealth malware deep in global telecom networks

China-linked hackers plant stealth malware deep in global telecom networks

China-linked hackers plant stealth malware deep in global telecom networks

https://etimg.etb2bimg.com/thumb/msid-129858203,imgsize-20624,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/china-linked-hackers-plant-stealth-malware-deep-in-global-telecom-networks.jpg

A China-linked state-sponsored hacking group has been found embedding highly stealthy malware deep inside global telecom infrastructure, raising concerns of long-term cyber espionage, a report has said.

The data by cybersecurity firm Rapid7 showed that the attackers have deployed advanced tools such as kernel-level implants and passive backdoors designed to stay hidden inside networks for long periods.

These tools act like “digital sleeper cells”, allowing hackers to quietly monitor systems and maintain access without being detected.

Although the activity has not been officially linked to any known advanced persistent threat (APT) group, experts believe the operation is aimed at high-level espionage, including potential surveillance of government and critical communication networks.

Rapid7’s investigation found that the attackers used a combination of techniques to gain and maintain access.

They exploited vulnerabilities in widely used systems from companies like Cisco, Fortinet, VMware, Palo Alto Networks and Ivanti, along with web platforms such as Apache Struts, to break into networks.

One of the key tools used in the campaign is a Linux-based backdoor known as BPFdoor.

This malware operates inside the system’s kernel and remains inactive while monitoring network traffic.

It only activates when it detects a specific hidden signal within data packets, making it extremely difficult to detect, the report said.

Once inside, the attackers deploy additional tools like credential harvesters, keyloggers and remote command frameworks to move across systems and maintain control.

They also use passive backdoors such as TinyShell to ensure continued access, even if some parts of the attack are discovered.

Rapid7 warned that the goal of the operation is not just to hack individual systems but to gain a foothold in the core infrastructure that powers telecom networks.

This includes both traditional systems and modern cloud-based environments like Kubernetes, which are widely used in telecom operations.

The report highlights that newer versions of the malware are even more advanced, hiding their signals inside normal-looking encrypted web traffic and using multiple techniques to bypass security layers.

Cybersecurity experts said such campaigns are particularly dangerous because they target the backbone of communication systems, allowing attackers to potentially monitor data flows, disrupt services, or prepare for future cyber operations.

  • Published On Mar 28, 2026 at 08:56 AM IST

Join the community of 2M+ industry professionals.

Subscribe to Newsletter to get latest insights & analysis in your inbox.

All about ETCISO industry right on your smartphone!




Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket