Unit 42 uncovered a sophisticated cyber-espionage campaign, labeled CL-STA-0969, targeting global telecommunications infrastructure, especially mobile roaming networks, in Southwest and East Asia. The threat actor, with strong overlaps to Liminal Panda, utilized advanced operational security (OPSEC), custom implants, DNS/ICMP tunneling, and compromised interconnectivity between telecom vendors to maintain long-term persistence and covert control.
Severity Level: High
Malware Involved
- Custom Backdoors: AuthDoor, GTPDoor, EchoBackdoor, ChronosRAT, NoDepDNS
- Network Tools: Cordscan, SGSN Emulator, Microsocks, FScan, Responder
- Exploit Kits: exploit_userspec.py (for CVE-2021-3156), PwnKit (for CVE-2021-4034)
Threat Actor
- Attributed to Liminal Panda, with shared tooling traits seen in UNC1945, UNC2891, UNC3886, and Light Basin.
- Likely nation-state sponsored, based on tactics, victimology, and persistence.
Campaign Scale
- Activity observed from February to November 2024.
- Targeted multiple telecoms globally, primarily in Asia.
- Exploited telecom roaming exchange (GRX) infrastructure.
Attack Overview
- SSH brute-force login as initial access vector using telecom-specific built-in accounts.
- Exploited known vulnerabilities for Privilege Escalation: CVE-2016-5195 (DirtyCOW), CVE-2021-4034 (Polkit pkexec), CVE-2021-3156 (sudo buffer overflow)
- Backdoors embedded in PAM modules (e.g., pam_unix.so) with stealthy credential logging and access bypass.
- DNS/ICMP/GTP used for covert command-and-control (C2) communication.
- High OPSEC: log cleansing, timestomping, process masquerading.
- Used telecom-specific implants like Cordscan and SGSN Emulator to extract mobile network data (IMSI/HNI).
- Deployed FRP (Fast Reverse Proxy) and ProxyChains for exfiltration and lateral movement.
Recommendations
- Enforce MFA for all SSH and telecom infrastructure access points.
- Audit and disable default or built-in telecom equipment accounts.
- Use account lockout policies and rate limiting for SSH login attempts to defend against brute-force attacks.
- Immediately patch systems vulnerable to: CVE-2016-5195 (DirtyCOW), CVE-2021-4034 (Polkit pkexec), CVE-2021-3156 (sudo buffer overflow)
- Upgrade legacy Linux kernels (pre-4.8.3) and deprecated telecom equipment OS builds.
- Remove unnecessary services like telnet, ftp, or outdated PAM modules.
- Search for unauthorized PAM modules (e.g., altered pam_unix.so) and backdoor hooks.
- Enable File Integrity Monitoring (FIM) for: /usr/bin/, /usr/lib/security/, /etc/pam.d/, /etc/selinux/, and cron jobs.
- Watch for process names masquerading as system services ([watchdog/1], httpd -D, dbus-console, etc.).
- Block the IOCs at their respective controls https://www.virustotal.com/gui/collection/d73d817b5ed40295038aafd026e0ba171beef21a2ed9685a73744e348c5615ca/iocs
MITRE ATT&CK
| Tactic | Technique | ID |
| Initial Access | Brute Force: Password Guessing | T1110.001 |
| Exploit Public-Facing Application | T1190 | |
| Execution | Command and Scripting Interpreter | T1059 |
| Scheduled Task/Job: Cron | T1053.003 | |
| Persistence | Event Triggered Execution: Pluggable Authentication Modules | T1546.003 |
| Create Account: Local Account | T1136.001 | |
| Privilege Escalation | Exploitation for Privilege Escalation | T1068 |
| Defense Evasion | Deobfuscate/Decode Files or Information | T1140 |
| Indicator Removal on Host: File Deletion | T1070.004 | |
| Masquerading | T1036 | |
| Disable or Modify System Firewall | T1562.004 | |
| Credential Access | Modify Authentication Process | T1556.003 |
| Discovery | Network Service Scanning | T1046 |
| Lateral Movement | Remote Services: SSH | T1021.001 |
| Command and Control | Application Layer Protocol: Web Protocols | T1071.001 |
| Proxy: Internal Proxy | T1090.001 | |
| Collection | Data from Local System | T1005 |
| Exfiltration | Exfiltration Over Alternative Protocol: ICMP | T1048.003 |
| Exfiltration Over Alternative Protocol: DNS | T1048.002 |
Source:
- https://unit42.paloaltonetworks.com/infiltration-of-global-telecom-networks/
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.