Skip to main content
Suzu Logo
  • Home
  • Product
  • Our Solutions
    • AI Advisory
    • AI Assessment
    • AI Integration
    • Cybersecurity Services
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Contact Us
Back to Blog
Critical Infrastructure Dark Web Supply Chain BPF door Red Menshen APT Salt Typhoon Nation-State Kernel Implant Telecom Security China-nexus

BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It

Mike Bell March 26, 2026 8 min read
Table of Contents

    Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what BPFdoor is, how it evolved, and what defenders need to do now.

    Key Takeaways:

    • BPFdoor is a kernel-level Linux backdoor used by the China-nexus group Red Menshen to maintain long-term, undetectable access inside telecom infrastructure
    • New variants have evolved significantly from simple magic packet triggers to HTTPS-embedded activation and SCTP signaling protocol filtering targeting 4G and 5G core networks
    • This operates deeper than Salt Typhoon, which targeted the IT layer. Red Menshen is embedded in the kernel of systems that are the telecom backbone
    • Dark web intelligence found no evidence of BPFdoor being traded as commodity tooling, suggesting the operational complexity keeps it in the hands of nation-state actors
    • The FCC's foreign router ban addresses supply chain risk at the edge, but the adversary is already past the edge and inside the signaling core

    Three days ago, the FCC banned imports of new foreign-made consumer routers, citing Volt Typhoon, Flax Typhoon, and Salt Typhoon by name. China controls roughly 60 percent of the U.S. home router market, so the supply chain risk is real and that move was overdue. But the same week the government locked down the front door, Rapid7 published research showing a China-nexus group has been living inside the signaling core of telecom networks for what appears to be years. The policy is catching up to one problem while the adversary has already moved on to the next.

    What Is BPFdoor? Pre-Positioned Access, Not Smash-and-Grab

    The implant at the center of Rapid7's research is BPFdoor, a backdoor that abuses Berkeley Packet Filter to inspect network traffic inside the Linux kernel itself. It doesn't open ports, doesn't beacon home, doesn't show up in netstat or any standard monitoring tool. It sits completely dormant until the operator sends a specifically crafted packet, and then it activates a remote shell.

    From an intelligence standpoint, this looks like pre-positioned access. The kind you build and maintain when you want the option to observe or disrupt at a time of your choosing. This isn't a criminal operation optimized for speed and monetization. The patience and the targeting profile point to an adversary playing a longer game.

    The group behind it, Red Menshen, has been deploying samples that mimic HPE ProLiant hardware management daemons and Docker container processes. They know exactly what infrastructure they're sitting on and they're hiding in the operational noise of telecom-grade environments.

    How BPFdoor Evolved: From Magic Packets to HTTPS Triggers

    BPFdoor has been documented since 2021 and the source code leaked publicly in 2022. The current variants are dangerous because the tradecraft has evolved considerably since then. Earlier versions used simple "magic packet" triggers over TCP or UDP, effective but detectable if you knew what to look for. The new variants hide their activation triggers inside legitimate HTTPS traffic that passes cleanly through TLS termination and reverse proxies before reaching the implant. Rapid7 describes a "magic ruler" technique where mathematical padding ensures the command marker always lands at a fixed byte offset regardless of how proxy layers modify the headers. That's tradecraft designed to survive modern enterprise security stacks, not amateur tooling someone pulled off a leak site.

    The bigger evolution is SCTP filtering. SCTP is the signaling protocol that coordinates subscriber identity, device authentication, and call routing across 4G and 5G core networks. By filtering this traffic at the kernel level, the operators can observe subscriber identifiers and authentication exchanges without touching the applications or databases that defenders typically monitor. The report also documents ICMP tunneling between compromised hosts for lateral movement, and that's traffic most SOCs don't inspect at all.

    BPFdoor vs. Salt Typhoon: Kernel-Level Access Changes Everything

    Salt Typhoon compromised nine US telecoms in 2024 and eventually hit 200 companies worldwide. That campaign was serious, but it operated from the IT layer. Stealing call records, accessing lawful intercept systems, moving through the enterprise side of the network. Red Menshen is operating below that. The implants are embedded inside the kernel of systems that ARE the telecom infrastructure, not systems that connect to it. They're mimicking hardware daemons on bare-metal ProLiant servers and container runtimes in Kubernetes pods running 5G core network functions. They're not breaking into the house. They're living in the walls.

    For defenders, it changes where you have to look. Salt Typhoon could be detected with strong EDR and network monitoring at the application layer. This requires visibility into the kernel itself. BPF filter enumeration, raw socket auditing, process integrity validation on hardware management services.

    BPFdoor Dark Web Intelligence: What the Underground Tells Us

    When we ran our own dark web intelligence against BPFdoor through our threat intelligence platform, it wasn't showing up in underground markets or being offered as commodity tooling. The source code has been public for three years, but our searches across forums, Telegram channels, and paste sites over the past 180 days turned up discussion almost entirely confined to the security research community. That doesn't mean nobody outside a state program has picked it up, but the operational complexity of deploying kernel-level implants inside telecom signaling infrastructure makes it hard to operationalize. This isn't something a ransomware crew is going to bolt onto their toolkit. The organizations being targeted are dealing with an adversary that has the resources and the patience to maintain these implants across years.

    How to Detect BPFdoor: Where Telecom Security Teams Need to Focus

    Telecom security teams need to expand visibility below the application layer. Priority detection actions include:

    • Monitor for anomalous BPF filters attached to sockets that shouldn't have them
    • Audit raw socket usage and flag unexpected processes opening raw sockets
    • Validate process integrity on hardware management services, particularly HPE ProLiant hpasmlited and similar daemons
    • Run a BPFdoor detection scanner like snapattack's bpfdoor-scanner on any Linux infrastructure in telecom environments
    • Implement SCTP traffic monitoring in 4G and 5G core environments as a security function, not just a network engineering responsibility
    • Inspect ICMP traffic between internal hosts for tunneling patterns that indicate lateral command propagation

    If your SOC doesn't have visibility into signaling plane traffic, you have a blind spot that this adversary is specifically exploiting.

    The FCC's router ban addresses a real supply chain vulnerability at the network edge. But Rapid7's research shows the adversary isn't waiting at the edge. They're already inside the infrastructure that makes the network function, and finding them requires looking in places most defenders haven't been watching.

    Frequently Asked Questions

    What is BPFdoor malware? BPFdoor is a Linux kernel-level backdoor that abuses Berkeley Packet Filter (BPF) to passively monitor network traffic without opening ports or generating detectable network signatures. It remains dormant until activated by a specially crafted "magic packet," at which point it opens a remote shell for the operator. It has been linked to the China-nexus threat group Red Menshen and is primarily used against telecom infrastructure.

    How is BPFdoor different from other backdoors? Unlike most backdoors that open listening ports or beacon to command-and-control servers, BPFdoor operates entirely within the Linux kernel and produces no visible network footprint. Newer variants embed their triggers inside legitimate HTTPS traffic and can filter SCTP signaling protocols used in 4G and 5G core networks, giving operators visibility into subscriber identity and authentication data.

    Can BPFdoor be detected? Yes, but it requires looking below the application layer. Defenders should monitor for unexpected BPF filters on sockets, anomalous raw socket usage, and processes masquerading as legitimate hardware management services. Community-developed tools like snapattack's bpfdoor-scanner can identify BPFdoor implants by exploiting the malware's heartbeat response behavior, and YARA rules are available for binary detection.

    Is BPFdoor available on the dark web? Based on Suzu Labs' dark web intelligence searches over the past 180 days, we found no evidence of BPFdoor being actively traded or offered as commodity tooling in underground markets despite the source code being public since 2022. The operational complexity of deploying it effectively inside telecom kernel infrastructure likely limits its use to well-resourced state-sponsored actors.

    Sources:

    • Rapid7 - BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
    • SecurityWeek - Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
    • Trend Micro - Detecting BPFDoor Backdoor Variants
    • Security Boulevard - APT Group Red Menshen Rapidly Evolving BPFDoor
    • TechCrunch - Salt Typhoon Global Telecom Hacks
    • Suzu Labs BitSight CTI dark web intelligence (3 searches, 476 total results across BPFdoor/Red Menshen activity, telecom backdoor markets, and SCTP/SS7 signaling exploit chatter)

    Dark Web Intelligence Summary

    BPFdoor discussion across dark web forums, Telegram channels, and paste sites is overwhelmingly confined to the cybersecurity research community rather than criminal marketplaces. Despite the source code leaking publicly in 2022, our searches over the past 180 days didn't turn up BPFdoor variants being actively traded or advertised in underground markets. That's not conclusive on its own, but combined with the operational complexity of deploying kernel-level implants inside telecom signaling infrastructure, it suggests this capability is more likely limited to well-resourced state actors than spreading through the commodity malware ecosystem.

     

    Share
    Tags: Critical Infrastructure Dark Web Supply Chain BPF door Red Menshen APT Salt Typhoon Nation-State Kernel Implant Telecom Security China-nexus
    Mike Bell
    Mike Bell

    Founder and CEO of Suzu Labs, a veteran-owned cybersecurity firm specializing in security assessments, data privacy, and AI-powered business intelligence. He is a U.S. Army veteran with an active security clearance and over two decades of experience in cybersecurity.

    ← Previous Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026

    Latest Posts

    View All
    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Critical Infrastructure
    Mar 26, 2026 Mike Bell

    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It

    Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what ...

    Read More: BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    Cybersecurity
    Mar 23, 2026 Hannah Perez

    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026

    We are incredibly proud to announce a monumental achievement. At this year’s Global InfoSec Awards 2026, hosted by ...

    Read More: Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    Cybersecurity
    Mar 16, 2026 Phillip Wylie

    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

    The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...

    Read More: Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Critical Infrastructure
    Mar 13, 2026 Denis Calderone

    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

    On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...

    Read More: From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    Social Engineering
    Mar 09, 2026 Suzu Labs Intelligence

    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

    Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...

    Read More: Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More: The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More: The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Cybersecurity
    Mar 03, 2026 Phillip Wylie

    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

    In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...

    Read More: Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More: Anthropic and Claude: 2026 AI Powerhouse
    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Cybersecurity
    Feb 24, 2026 Phillip Wylie

    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

    In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...

    Read More: Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Cybersecurity
    Feb 17, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

    In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...

    Read More: Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More: Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Threat Intelligence
    Feb 10, 2026 Phillip Wylie

    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...

    Read More: Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More: Under Armour Breach: What The Forum Data Actually Shows
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More: Brightspeed Breach: Crimson Collective and the Infostealer Problem
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More: When Grid Data Goes Dark Web
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More: The $150,000 Password
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact
    • FAQ's

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Cybersecurity

    Resources

    • Insights
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions