China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
China-Linked APT UAT-9244 Unleashes Triple-Threat Cyber Arsenal on South American Telecoms
In a brazen cyber espionage campaign that reads like a Hollywood thriller, a China-linked advanced persistent threat (APT) group dubbed UAT-9244 has been systematically infiltrating critical telecommunications infrastructure across South America since 2024. Cisco Talos researchers have uncovered a sophisticated operation deploying three previously undocumented malware implants—TernDoor, PeerTime, and BruteEntry—targeting Windows, Linux, and edge devices with surgical precision.
The campaign, which began in 2024, represents a significant escalation in cyber espionage tactics. UAT-9244, closely associated with the infamous FamousSparrow APT cluster, has demonstrated remarkable technical sophistication in its approach. While sharing tactical overlaps with the notorious Salt Typhoon group—known for its telecom sector targeting—researchers emphasize there’s no conclusive evidence directly linking these two entities.
TernDoor: The Windows Weapon
At the heart of UAT-9244’s Windows-focused attacks lies TernDoor, a backdoor that employs advanced DLL side-loading techniques. The malware cleverly hijacks the legitimate “wsprint.exe” executable to load a rogue DLL named “BugSplatRc64.dll,” which then decrypts and executes the final payload directly in memory. This technique allows the malware to evade traditional security measures while maintaining persistence through scheduled tasks or Registry Run keys.
What makes TernDoor particularly concerning is its evolution from Crowdoor—itself a variant of SparrowDoor. The malware has been actively deployed since at least November 2024 and includes unique features such as embedded Windows drivers capable of suspending, resuming, and terminating processes. Its minimalist design only supports a single command-line switch (“-u”) for self-removal, making forensic analysis challenging.
PeerTime: The Linux P2P Powerhouse
For Linux systems, UAT-9244 employs PeerTime, a peer-to-peer backdoor that demonstrates the group’s understanding of diverse computing environments. What’s particularly noteworthy is that PeerTime is compiled for multiple architectures including ARM, AARCH, PPC, and MIPS, allowing it to infect a wide range of embedded systems commonly found in telecommunications infrastructure.
The malware’s distribution mechanism is equally sophisticated. An instrumentor binary, containing debug strings in Simplified Chinese, checks for Docker presence before deploying the PeerTime loader. This loader decrypts and decompresses the final payload directly in memory, avoiding traditional file-based detection methods. The backdoor comes in two variants—one written in C/C++ and a newer version programmed in Rust—demonstrating the group’s commitment to evolving their toolkit.
PeerTime’s use of the BitTorrent protocol for command-and-control communication is particularly innovative. By leveraging this decentralized protocol, the malware can fetch C2 information, download files from peers, and execute them on compromised systems while making detection and disruption significantly more difficult.
BruteEntry: The Edge Device Offensive
The third prong of UAT-9244’s attack strategy targets network edge devices with BruteEntry, a Golang-based brute-force scanner designed to transform compromised devices into mass-scanning proxy nodes. This component is particularly concerning because it enables the creation of an Operational Relay Box (ORB) capable of conducting large-scale brute-force attacks against Postgres, SSH, and Tomcat servers.
The attack chain is methodical: a shell script drops two components—an orchestrator that delivers BruteEntry, which then contacts a C2 server to obtain target IP addresses. Successful login attempts are meticulously reported back to the command server, with detailed notes indicating whether credentials were successfully compromised or if “All credentials tried” failed.
Technical Sophistication and Strategic Implications
The UAT-9244 campaign demonstrates several concerning trends in modern cyber espionage. First, the group’s ability to develop and deploy multiple, specialized implants for different operating systems and architectures shows a level of resource investment typically associated with nation-state actors. Second, their use of advanced techniques like DLL side-loading, in-memory execution, and decentralized C2 communication indicates a deep understanding of both offensive security and defensive evasion.
The targeting of telecommunications infrastructure is particularly strategic. Telecom providers serve as critical infrastructure, offering attackers potential access to vast amounts of sensitive communications data and providing footholds for broader network infiltration. The geographic focus on South America suggests either regional strategic interests or testing grounds for broader deployment.
Attribution and Context
While UAT-9244 is assessed to be China-linked, attribution in cyber operations remains challenging. The group’s tactical overlap with FamousSparrow and potential connections to Salt Typhoon highlight the complex ecosystem of Chinese-speaking APT groups. These clusters often share tools, techniques, and infrastructure while maintaining operational independence, making precise attribution difficult.
The presence of Simplified Chinese strings in multiple components provides linguistic evidence supporting the China nexus, though this alone is not definitive proof. The sophistication of the operation, combined with its strategic targeting, aligns with known patterns of Chinese state-sponsored cyber operations.
Defensive Recommendations
Organizations in the telecommunications sector should prioritize several defensive measures. Regular patching of Windows Server and Microsoft Exchange Server systems is critical, as the group has historically targeted outdated versions. Network segmentation can limit lateral movement if initial compromise occurs. Enhanced monitoring for unusual process injection, particularly into “msiexec.exe,” could help detect TernDoor deployment.
For Linux environments, monitoring for unusual peer-to-peer network traffic and Docker-related anomalies could provide early warning of PeerTime infections. Edge device security should include regular firmware updates and monitoring for unauthorized Golang processes that might indicate BruteEntry deployment.
The Broader Picture
The UAT-9244 campaign represents a significant evolution in cyber espionage tactics. The combination of multiple specialized implants, advanced evasion techniques, and strategic targeting of critical infrastructure demonstrates the increasing sophistication of APT operations. As telecommunications infrastructure becomes increasingly vital to national security and economic stability, such targeted campaigns are likely to continue and expand.
The use of Rust in newer malware variants also signals a trend toward more secure and harder-to-analyze programming languages in the cyber underground. This evolution challenges traditional defensive approaches and requires continuous adaptation of security measures.
Conclusion
UAT-9244’s campaign against South American telecommunications infrastructure serves as a stark reminder of the persistent and evolving nature of cyber threats. The group’s technical sophistication, strategic targeting, and use of multiple specialized implants demonstrate a level of capability that poses significant risks to critical infrastructure worldwide. As cyber espionage continues to evolve, organizations must remain vigilant and proactive in their defensive postures, recognizing that today’s targeted campaign could become tomorrow’s widespread threat.
CyberEspionage #APT #TelecomSecurity #UAT9244 #ChinaHacking #CyberThreat #NetworkSecurity #MalwareAnalysis #CyberDefense #DigitalWarfare
Viral Tags & Phrases:
China cyber attack, telecom hacking, APT group, UAT-9244 exposed, triple-threat malware, Linux backdoor, Windows DLL injection, edge device compromise, Salt Typhoon connection, FamousSparrow link, cyber espionage campaign, South American telecoms targeted, Cisco Talos research, peer-to-peer malware, brute-force attacks, critical infrastructure threat, nation-state hacking, advanced persistent threat, cybersecurity warning, digital espionage
Viral Sentences:
“China-linked hackers unleash triple-threat cyber arsenal on South American telecoms”
“Advanced persistent threat UAT-9244 demonstrates nation-state level sophistication”
“Telecom infrastructure becomes prime target for cyber espionage operations”
“Multiple malware implants reveal coordinated attack strategy”
“Peer-to-peer communication protocol used for command and control”
“Edge devices transformed into mass-scanning proxy nodes”
“Rust programming language signals evolution in malware development”
“Strategic targeting of critical infrastructure raises national security concerns”
“Advanced evasion techniques challenge traditional security measures”
“Cyber espionage campaign shows no signs of slowing down”
End of Article
,




Leave a Reply
Want to join the discussion?Feel free to contribute!