Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Edmunds compares the new BMW X3 and Mercedes-Benz GLC

October 29, 2025

German exhibition explores history of fragrance

October 29, 2025

Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run

October 28, 2025
Facebook X (Twitter) Instagram
Trending
  • Edmunds compares the new BMW X3 and Mercedes-Benz GLC
  • German exhibition explores history of fragrance
  • Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run
  • Mormon church women embrace new sleeveless sacred undergarments
  • Ex-thief says he warned Louvre of security weaknesses before jewel heist
  • Gardening can lead to mishaps as scary as any Halloween
  • Cat in the Hat returns in newly discovered Dr. Seuss manuscript
  • Americans love Halloween and won’t quit spooky season: AP-NORC poll
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, October 29
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild
Cybersecurity

Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild

By adminApril 16, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 93


Recently identified iterations of the BPFDoor Linux backdoor rely on a controller to open a reverse shell and control additional hosts on the network, Trend Micro reports.

Initially detailed in 2021, BPFDoor is a backdoor attributed to a Chinese state-sponsored threat actor tracked as Red Menshen and Earth Bluecrow, and which focuses on detection evasion, allowing attackers to maintain long-term access to infected networks.

Likely active for nearly a decade, the backdoor has been used over the past year in attacks against telecommunications, financial services, and retail entities in Hong Kong, Egypt, Malaysia, Myanmar, and South Korea.

Designed for cyberespionage, the malware stands out for its use of Berkeley Packet Filters (BPF) for stealth network traffic monitoring and command-and-control (C&C) communication.

BPFDoor uses a BPF filter that can inspect network traffic in the Linux firewall, which allows its operator to activate it using packets with magic sequences even if they are blocked by the firewall. Such features, Trend Micro notes, are typically found in rootkits, not backdoors.

In recent attacks, the backdoor was seen using a malware controller that allows the attackers to open a reverse shell or redirect connections to a shell on a specific port. It uses passwords supplied by the attacker to check the received command’s validity.

“Apart from using different connection modes, the controller is versatile enough to control infected machines using the three protocols supported by BPFDoor – TCP, UDP, and ICMP,” Trend Micro explains.

The cybersecurity firm also discovered that the controller can directly connect to an infected machine over TCP to open a shell, should the correct password be provided.

Advertisement. Scroll to continue reading.

Trend Micro also notes that, because the backdoor’s source code was leaked online in 2022, the recently observed attacks can be attributed only with moderate confidence to Earth Bluecrow. It also urges administrators to adopt strong defense measures to detect potential BPFDoor compromises.

“A backdoor like this can stay hidden in a network for a long time, and casual security sweeps such as port scans won’t see anything unusual. It also has evasion techniques, such as how it can change process names and how the backdoor does not listen to any port, making it difficult for system administrators to suspect that something is wrong with the servers,” Trend Micro notes.

Related: Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances

Related: Chinese APT Weaver Ant Targeting Telecom Providers in Asia

Related: Chinese Hacking Group MirrorFace Targeting Europe

Related: New Windows Zero-Day Exploited by Chinese APT: Security Firm



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Billionaire Kwek Leng Beng’s CDL Sells 84% Of Residential Towers Amid Singapore Property Boom

October 27, 2025

Buyers looking at the Zyon Grand sales gallery over the weekend launch.Courtesy of City DevelopmentsCity…

Here’s All The Vineyards, Restaurants And Properties In Which Gavin Newsom Owns Stakes

October 26, 2025

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025
Our Picks

Edmunds compares the new BMW X3 and Mercedes-Benz GLC

October 29, 2025

German exhibition explores history of fragrance

October 29, 2025

Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run

October 28, 2025

Mormon church women embrace new sleeveless sacred undergarments

October 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.