nation stateanalysis

Chinese hackers caught deep within telecom backbone infrastructure

April 2, 20265 min read3 sources
Share:
Chinese hackers caught deep within telecom backbone infrastructure

A new front in cyber espionage opens as state-sponsored actors go deeper than ever before.

Security researchers have uncovered a sophisticated, long-term espionage campaign targeting the core of global communications. A Chinese state-sponsored threat actor, dubbed “Unfading Sea Haze,” has successfully infiltrated telecommunications backbone infrastructure, deploying highly advanced malware that operates at the kernel level of Linux systems. The discovery, detailed in a June 2024 report by SentinelOne, reveals a new level of stealth and persistence in nation-state cyber operations, posing a significant threat to national security and individual privacy.

Background: The high-value target

Telecommunications networks are the central nervous system of modern society. They carry everything from personal communications and financial transactions to sensitive government and military data. For state-sponsored intelligence agencies, gaining deep, persistent access to this infrastructure is the ultimate prize. It allows for unparalleled surveillance capabilities and the potential to disrupt critical services during a conflict.

This incident is part of a larger pattern of activity targeting critical infrastructure. It echoes the strategic objectives of other campaigns attributed to China, such as the widely publicized activities of Volt Typhoon. That group was found pre-positioning itself within U.S. critical infrastructure networks, not for immediate data theft, but for potential future disruptive actions (Source: CISA). The tactics of Unfading Sea Haze, however, demonstrate a significant evolution in tooling, focusing on extreme stealth to enable long-term intelligence gathering.

Technical details: Living inside the kernel

The success of the Unfading Sea Haze campaign hinges on a custom-built malware suite designed to evade nearly all conventional security measures. According to SentinelOne’s analysis, the actor deployed at least two kernel implants and a passive backdoor.

BOLDMOVE and KORKERL (Kernel Implants): The primary tools are two Linux kernel implants named BOLDMOVE and KORKERL. A kernel implant is a malicious piece of code that runs with the highest level of privilege within an operating system’s core (the kernel). By lodging itself this deep, the malware can intercept, inspect, and manipulate any data or process on the machine. It can hide its own files, network connections, and processes from system administrators and security software that operate in the less-privileged “user-space.”

SentinelOne researchers first detected BOLDMOVE as early as 2021, indicating the threat actor has likely maintained access for years. Developing and deploying such malware requires immense resources and expertise, a capability possessed by only a handful of the world's most advanced intelligence agencies.

SKIPPER (Passive Backdoor): To maintain access and exfiltrate data, the group uses a passive backdoor called SKIPPER. Unlike a traditional backdoor that actively connects out to a command-and-control (C2) server, a passive backdoor simply listens for a specific, specially crafted packet—a “magic packet”—sent across the network. When it detects this packet, it activates, allowing the attacker to issue commands. This passive, listening-only approach makes the backdoor incredibly difficult to detect through network traffic analysis, as it generates no suspicious outbound connections.

The combination of kernel-level stealth and passive C2 communication allowed Unfading Sea Haze to operate undetected for an extended period, siphoning data and maintaining a powerful foothold within the compromised networks.

Impact assessment: A threat to all

The compromise of telecommunications backbone infrastructure has far-reaching implications that extend beyond the targeted companies.

  • National Security: An adversary with this level of access can monitor government, military, and intelligence communications. They can map critical network dependencies and pre-position themselves for future disruptive attacks, creating a severe national security risk.
  • Economic Espionage: The ability to intercept traffic provides a direct line into sensitive corporate communications, intellectual property, and trade secrets from any organization using the compromised provider's network.
  • Widespread Surveillance: The privacy of millions of individuals is at risk. While the attackers may be targeting specific individuals, the nature of their access allows for mass collection of communication metadata and potentially the content of unencrypted traffic.
  • Detection and Remediation Nightmare: For the affected telecom providers, identifying and eradicating this threat is a monumental challenge. Kernel implants can survive reboots and are designed to be invisible to standard endpoint detection tools. A complete and certain remediation may require wiping and rebuilding systems from a known-good state—a costly and disruptive process for core network infrastructure.

How to protect your infrastructure

Defending against threats as sophisticated as Unfading Sea Haze requires a defense-in-depth strategy that goes beyond conventional security controls. While individuals have limited power to secure their telecom provider, organizations, especially those in critical sectors, should take immediate steps.

For Organizations and Network Operators:

  • Kernel Integrity Monitoring: Deploy solutions that can monitor the integrity of the operating system kernel in real-time. This involves checking for unauthorized modifications to kernel modules and system calls.
  • Memory Forensics: Regularly conduct memory analysis on critical Linux systems. This is one of the few effective ways to identify the presence of rootkits and kernel-level implants that hide from disk-based scanning.
  • Assume Breach Mentality: Operate under the assumption that privileged segments of your network could be compromised. Implement strict network segmentation and micro-segmentation to limit lateral movement.
  • Egress Traffic Filtering: While SKIPPER is a passive backdoor, data exfiltration still requires outbound connections. Scrutinize all egress traffic from critical server segments and block any connections that are not explicitly authorized.
  • Least Privilege Access: Enforce strict access controls for all systems, especially those with administrative or root privileges. Gaining kernel-level access often requires an initial compromise that escalates privileges.

For Individuals:

While you cannot control your ISP's security, you can take steps to protect your own data as it transits their network. Use services that offer end-to-end encryption for all communications. For general web browsing and other activities, using a reputable VPN service can encrypt your traffic, making it unreadable to anyone snooping on the network, including a compromised provider.

The discovery of Unfading Sea Haze is a sobering reminder that the battle for control over our digital infrastructure is being waged in the deepest, most critical parts of the network. It highlights the continuous need for advanced threat detection and a proactive security posture to defend against highly resourced and patient adversaries.

Share:

// FAQ

What is a kernel implant and why is it so dangerous?

A kernel implant is malicious software that runs in the core (kernel) of an operating system, giving it the highest level of system privilege. It is dangerous because it can bypass most security software, hide its presence completely, and control every aspect of the compromised machine, including intercepting all data and network traffic.

How is the Unfading Sea Haze campaign different from Volt Typhoon?

While both are Chinese state-sponsored campaigns targeting critical infrastructure, their observed objectives and tools differ. Volt Typhoon focused on 'living off the land' techniques for potential future disruption. Unfading Sea Haze uses highly sophisticated, custom-built kernel malware primarily for long-term, stealthy espionage and intelligence gathering.

As an individual, am I at risk from this attack?

Indirectly, yes. While the threat actor is not targeting individuals en masse, the compromise of a telecom provider means your data (both content and metadata) could be intercepted as it travels through their network. This poses a significant privacy risk, especially for unencrypted communications.

Why are telecommunications companies such a high-value target for nation-states?

Telecommunications networks are the backbone of a nation's communication, economy, and government operations. Controlling or monitoring this infrastructure provides an adversary with unparalleled intelligence on a country's activities and offers the potential to disrupt society during a crisis, making it a primary target for espionage and strategic advantage.

// SOURCES

// RELATED

Iranian state hackers breached former official Kash Patel's email, FBI confirms
analysis

Iranian state hackers breached former official Kash Patel's email, FBI confirms

The FBI confirmed Iranian state-sponsored hackers compromised the personal email of former Trump official Kash Patel, part of a 2020 election interfer

6 min readApr 2
FCC bans new foreign-made routers, citing supply chain and cyber risks
analysis

FCC bans new foreign-made routers, citing supply chain and cyber risks

In a major escalation of its supply chain security strategy, the FCC has banned the import and sale of new, foreign-made consumer routers to mitigate

6 min readApr 2
Poland's critical infrastructure under siege: Analyzing the surge in state-sponsored cyberattacks
analysis

Poland's critical infrastructure under siege: Analyzing the surge in state-sponsored cyberattacks

As a key NATO ally, Poland faces an escalating wave of Russian-sponsored cyberattacks targeting its critical infrastructure, from railways to the ener

6 min readApr 1
China upgrades the backdoor it uses to spy on telcos globally
analysis

China upgrades the backdoor it uses to spy on telcos globally

Chinese APT Red Menshen's BPFdoor malware evades firewalls to spy on telcos. Defense requires active threat hunting, as traditional tools fail.

6 min readApr 1