• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
gtpdoor linux malware targets telecoms, exploiting gprs roaming networks

GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks

You are here: Home / General Cyber Security News / GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
February 29, 2024

Menace hunters have found a new Linux malware termed GTPDOOR which is made to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX)

The malware is novel in the reality that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-manage (C2) communications.

GPRS roaming enables subscribers to accessibility their GPRS services even though they are past the attain of their dwelling cell network. This is facilitated by signifies of a GRX that transports the roaming website traffic making use of GTP amongst the visited and the house General public Land Mobile Network (PLMN).

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Security researcher haxrob, who found out two GTPDOOR artifacts uploaded to VirusTotal from China and Italy, said the backdoor is likely joined to a acknowledged threat actor tracked as LightBasin (aka UNC1945), which was formerly disclosed by CrowdStrike in Oct 2021 in connection with a series of attacks concentrating on the telecom sector to steal subscriber data and connect with metadata.

GTPDOOR Linux Malware

“When run, the first factor GTPDOOR does is course of action-title stomps itself – shifting its approach title to ‘[syslog]’ – disguised as syslog invoked from the kernel,” the researcher explained. “It suppresses child alerts and then opens a uncooked socket [that] will allow the implant to receive UDP messages that hit the network interfaces.”

Set differently, GTPDOOR allows a risk actor that presently has recognized persistence on the roaming exchange network to get in touch with a compromised host by sending GTP-C Echo Ask for messages with a destructive payload.

This magic GTP-C Echo Request concept functions as a conduit to transmit a command to be executed on the infected device and return the results again to the remote host.

Cybersecurity

GTPDOOR “Can be covertly probed from an external network to elicit a reaction by sending a TCP packet to any port variety,” the researcher observed. “If the implant is active a crafted vacant TCP packet is returned alongside with details if the destination port was open up/responding on the host.”

“This implant seems like it is designed to sit on compromised hosts that directly contact the GRX network – these are the devices that communicate to other telecommunication operator networks through the GRX.”

Located this report appealing? Abide by us on Twitter  and LinkedIn to examine a lot more special articles we submit.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «lazarus hackers exploited windows kernel flaw as zero day in recent Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks
Next Post: New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems new silver saml attack evades golden saml defenses in identity»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.