Stealth Warfare in Telecom: How Red Menshen Is Redefining Persistence

Summary:

A sophisticated cyber espionage campaign attributed to Red Menshen has infiltrated telecom networks across the Middle East and Asia using highly stealthy, kernel-level implants such as BPFDoor. Unlike conventional malware that relies on visible command-and-control communication, these implants operate silently by leveraging technologies such as Berkeley Packet Filter to monitor network traffic passively and activate only upon receiving specially crafted trigger packets.

This persistent and covert access enables credential harvesting, lateral movement, and potential surveillance of sensitive communications, including subscriber data. The campaign highlights a significant shift in threat actor capabilities, emphasizing deep infrastructure compromise, advanced evasion techniques, and the growing strategic risk posed to telecom operators and government networks.

Technical Description:

The campaign attributed to Red Menshen begins with the exploitation of internet-facing edge devices such as VPN gateways, firewalls, and web services to gain initial access. Following compromise, attackers deploy post-exploitation frameworks including CrossC2, credential harvesting tools, and lateral movement utilities to establish control within the environment.

The core capability of the campaign is BPFDoor, a kernel-level implant that leverages Berkeley Packet Filter to inspect live network traffic in real time. The implant remains dormant and undetectable until it identifies a specially crafted “magic packet,” at which point it activates and spawns a remote shell without opening network ports or generating observable beaconing activity.

Advanced variants further enhance stealth by embedding trigger signals at specific byte offsets within HTTPS traffic and enabling covert communication through ICMP. Controller components can operate within compromised environments to propagate activation across infected systems. In telecom environments, support for protocols such as Stream Control Transmission Protocol enables deeper visibility into signaling traffic, facilitating continuous low-noise monitoring and control of critical infrastructure. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

Red Menshen primarily gains initial access by exploiting vulnerabilities in internet-facing infrastructure, including VPN gateways, firewalls, and web applications. Common targets include exposed services such as Apache Struts and enterprise technologies from vendors like Cisco, Fortinet, and VMware. These entry points provide access to high-value network traffic within telecom environments.

The Infection chain was identified as follows,

  • Attackers exploit vulnerabilities in internet-facing systems such as VPNs, firewalls, and web servers to gain initial access into the environment.
  • Following the compromise, lightweight backdoors and frameworks such as CrossC2 are deployed to establish control and initiate reconnaissance activities.
  • Credential harvesting tools and brute-force techniques are used to obtain elevated privileges and expand access across the network.
  • Lateral movement is conducted to identify and compromise critical systems, particularly within telecom infrastructure and core network components.
  • A persistent kernel-level implant such as BPFDoor is deployed to maintain long-term, stealthy access and enable covert remote command execution.

Technical Capabilities:

The campaign demonstrates advanced technical capabilities focused on deep system integration, persistence, and stealth. BPFDoor operates within the kernel, leveraging Berkeley Packet Filter to passively monitor network traffic without generating visible command-and-control activity or opening listening ports. Activation occurs only when a specifically crafted trigger packet is detected, allowing attackers to execute commands through a hidden remote shell while remaining undetected by conventional monitoring tools.

Enhanced variants incorporate additional evasion and communication techniques, including embedding trigger signals within HTTPS traffic and using ICMP as a covert communication channel. These mechanisms allow attackers to maintain command-and-control without raising suspicion in standard network monitoring systems.

The malware also supports telecom-specific protocols such as Stream Control Transmission Protocol, enabling attackers to inspect signalling traffic and potentially monitor subscriber activity. Combined with internal propagation mechanisms, these capabilities allow for sustained, low-noise lateral movement, long-term persistence, and extensive surveillance within complex telecom environments.

Attribution and Evolution:

The activity has been consistently attributed to Red Menshen, also known as Earth Bluecrow and Red Dev 18, a threat group known for long-term cyber espionage campaigns. Since at least 2021, the group has evolved from deploying conventional malware to implementing highly stealthy, infrastructure-level persistence techniques.

Recent developments indicate increased sophistication, including encrypted trigger mechanisms, deeper kernel integration, and advanced evasion techniques tailored for modern enterprise and telecom environments. This evolution reflects a strategic focus on maintaining long-term, covert access within high-value networks.

Active Campaign and Geographic Spread:

The campaign has been observed targeting telecommunications providers across the Middle East and Asia, particularly in regions of geopolitical significance. By compromising telecom infrastructure, attackers gain indirect access to government communications, enterprise data flows, and potentially large volumes of subscriber information.

The geographic targeting suggests that the campaign is aligned with intelligence collection objectives, enabling surveillance and strategic monitoring across critical regions and sectors.

Conclusion:

This campaign reflects a broader shift in cyber espionage toward deep infrastructure compromise and persistent, covert access. By deploying implants at the kernel level and leveraging legitimate technologies such as Berkeley Packet Filter, attackers can bypass traditional security controls and maintain long-term access without detection.

Organizations, particularly telecom operators, must enhance detection strategies by focusing on kernel integrity monitoring, network-level anomaly detection, and proactive threat hunting to address this evolving threat landscape.

Impact:

The impact of this campaign is significant due to its ability to provide sustained, low-noise access to critical infrastructure. Compromise of telecom networks enables surveillance of communications, potential tracking of individuals, and access to sensitive metadata across large populations.

The stealthy nature of BPFDoor makes detection extremely challenging, increasing the likelihood of prolonged, undetected intrusions and large-scale intelligence collection activities.

IOC and Context Details:

Topics Details
Tactic Name Persistence, Defense Evasion, Command and Control, Lateral Movement
Technique Name Kernel-Level Implant Deployment, Passive Backdoor Execution, Credential Access, Network Traffic Inspection
Sub Technique Name Magic Packet Triggering, BPF-based Packet Filtering Abuse, ICMP Covert Channel Communication, HTTPS Trigger Obfuscation
Attack Type Malware
Targeted Applications Network edge devices, VPN gateways, firewalls, Linux servers, telecom core infrastructure, systems from Cisco, Fortinet, VMware
Region Impacted Middle East and Asia
Industry Impacted Telecommunications, Government, Critical Infrastructure
IOC’s SHA-256 Hash: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 NA

Recommended Actions:

  • Prioritize patching and hardening of internet-facing systems, including VPNs, firewalls, and edge devices, to reduce exposure to initial access vectors.
  • Implement advanced network traffic inspection and anomaly detection capable of identifying unusual packet patterns and covert trigger mechanisms.
  • Deploy endpoint detection and response solutions with visibility into kernel-level activity and memory analysis to detect stealthy implants.
  • Enforce strong access controls and multi-factor authentication to reduce the risk of credential compromise and lateral movement.
  • Conduct proactive threat hunting focused on indicators of passive backdoors and abnormal use of Berkeley Packet Filter mechanisms.
  • Segment critical telecom and core network infrastructure to limit the impact of potential compromises and restrict attacker movement.
  • Monitor ICMP and encrypted HTTPS traffic for anomalies that may indicate covert communication channels.
  • Establish centralized logging, continuous monitoring, and incident response processes to detect and respond to long-term persistent threats effectively.

Reference:

https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/