
A China‑linked advanced persistent threat group, UAT‑9244, has been targeting telecommunications (telecom) providers in South America since at least 2024. Learn more about this targeted campaign and how to protect your environment in this Cybersecurity Threat Advisory.
What is the threat?
UAT‑9244 has conducted a long‑running cyber‑espionage campaign using three new custom malware implants, including TernDoor, PeerTime, and BruteEntry across Windows, Linux, and network‑edge devices to gain deep, persistent access to carrier networks, move laterally, and potentially monitor or disrupt communications.
- TernDoor is a Windows backdoor that attackers deliver via DLL side‑loading. The malware abuses the legitimate wsprint.exe process to load a malicious BugSplatRc64.dll, which decrypts and injects the final payload into msiexec.exe in memory. TernDoor includes an embedded Windows driver (WSPrint.sys) that allows attackers to terminate, suspend, and resume processes. The malware maintains persistence through scheduled tasks and Registry modifications that also conceal the task, and it supports remote shell access, arbitrary process execution, file read/write operations, system reconnaissance, and self‑uninstallation.
- PeerTime is an ELF‑based Linux backdoor compiled for multiple architectures, including ARM, AARCH, PPC, and MIPS, enabling attackers to compromise a wide range of embedded systems and telecommunications network devices. Cisco Talos identified two variants—one written in C/C++ and one in Rust—with Simplified Chinese debug strings present in the instrumentor binary. PeerTime decrypts and executes its payload entirely in memory, renames the process to appear benign, and operates as a peer‑to‑peer backdoor that uses the BitTorrent protocol for command and control, retrieves payloads from peers, and relies on BusyBox to write files to disk.
- BruteEntry consists of a Go‑based instrumentor and a brute‑force component that converts infected systems into scanning nodes, known as Operational Relay Boxes (ORBs). These ORBs scan for new targets and attempt to brute‑force SSH, PostgreSQL, and Tomcat services, then report authentication results, status, and notes back to the command‑and‑control server.
Why is it noteworthy?
What is the exposure or risk?
What are the recommendations?
Barracuda strongly recommends taking the following actions to mitigate risk:
- Ensure telecom devices and servers are updated.
- Isolate telecom edge devices from core infrastructure.
- Watch for BitTorrent traffic anomalies and brute‑force scanning patterns.
- Prepare for multi‑platform response — Windows, Linux, and embedded systems.
References
For more in-depth information about the recommendations, please visit the following links:
- Chinese state hackers target telcos with new malware toolkit
- Chinese hackers target telcos in South America with new malware
- China-Nexus Hackers Attacking Telecommunication Providers With New Malware
If you have any questions about this Cybersecurity Threat Advisory, don’t hesitate to get in touch with Barracuda Managed XDR’s Security Operations Center.
This post originally appeared on Smarter MSP.

