A new front in cyber espionage opens as state-sponsored actors go deeper than ever before.
Security researchers have uncovered a sophisticated, long-term espionage campaign targeting the core of global communications. A Chinese state-sponsored threat actor, dubbed “Unfading Sea Haze,” has successfully infiltrated telecommunications backbone infrastructure, deploying highly advanced malware that operates at the kernel level of Linux systems. The discovery, detailed in a June 2024 report by SentinelOne, reveals a new level of stealth and persistence in nation-state cyber operations, posing a significant threat to national security and individual privacy.
Background: The high-value target
Telecommunications networks are the central nervous system of modern society. They carry everything from personal communications and financial transactions to sensitive government and military data. For state-sponsored intelligence agencies, gaining deep, persistent access to this infrastructure is the ultimate prize. It allows for unparalleled surveillance capabilities and the potential to disrupt critical services during a conflict.
This incident is part of a larger pattern of activity targeting critical infrastructure. It echoes the strategic objectives of other campaigns attributed to China, such as the widely publicized activities of Volt Typhoon. That group was found pre-positioning itself within U.S. critical infrastructure networks, not for immediate data theft, but for potential future disruptive actions (Source: CISA). The tactics of Unfading Sea Haze, however, demonstrate a significant evolution in tooling, focusing on extreme stealth to enable long-term intelligence gathering.
Technical details: Living inside the kernel
The success of the Unfading Sea Haze campaign hinges on a custom-built malware suite designed to evade nearly all conventional security measures. According to SentinelOne’s analysis, the actor deployed at least two kernel implants and a passive backdoor.
BOLDMOVE and KORKERL (Kernel Implants): The primary tools are two Linux kernel implants named BOLDMOVE and KORKERL. A kernel implant is a malicious piece of code that runs with the highest level of privilege within an operating system’s core (the kernel). By lodging itself this deep, the malware can intercept, inspect, and manipulate any data or process on the machine. It can hide its own files, network connections, and processes from system administrators and security software that operate in the less-privileged “user-space.”
SentinelOne researchers first detected BOLDMOVE as early as 2021, indicating the threat actor has likely maintained access for years. Developing and deploying such malware requires immense resources and expertise, a capability possessed by only a handful of the world's most advanced intelligence agencies.
SKIPPER (Passive Backdoor): To maintain access and exfiltrate data, the group uses a passive backdoor called SKIPPER. Unlike a traditional backdoor that actively connects out to a command-and-control (C2) server, a passive backdoor simply listens for a specific, specially crafted packet—a “magic packet”—sent across the network. When it detects this packet, it activates, allowing the attacker to issue commands. This passive, listening-only approach makes the backdoor incredibly difficult to detect through network traffic analysis, as it generates no suspicious outbound connections.
The combination of kernel-level stealth and passive C2 communication allowed Unfading Sea Haze to operate undetected for an extended period, siphoning data and maintaining a powerful foothold within the compromised networks.
Impact assessment: A threat to all
The compromise of telecommunications backbone infrastructure has far-reaching implications that extend beyond the targeted companies.
- National Security: An adversary with this level of access can monitor government, military, and intelligence communications. They can map critical network dependencies and pre-position themselves for future disruptive attacks, creating a severe national security risk.
- Economic Espionage: The ability to intercept traffic provides a direct line into sensitive corporate communications, intellectual property, and trade secrets from any organization using the compromised provider's network.
- Widespread Surveillance: The privacy of millions of individuals is at risk. While the attackers may be targeting specific individuals, the nature of their access allows for mass collection of communication metadata and potentially the content of unencrypted traffic.
- Detection and Remediation Nightmare: For the affected telecom providers, identifying and eradicating this threat is a monumental challenge. Kernel implants can survive reboots and are designed to be invisible to standard endpoint detection tools. A complete and certain remediation may require wiping and rebuilding systems from a known-good state—a costly and disruptive process for core network infrastructure.
How to protect your infrastructure
Defending against threats as sophisticated as Unfading Sea Haze requires a defense-in-depth strategy that goes beyond conventional security controls. While individuals have limited power to secure their telecom provider, organizations, especially those in critical sectors, should take immediate steps.
For Organizations and Network Operators:
- Kernel Integrity Monitoring: Deploy solutions that can monitor the integrity of the operating system kernel in real-time. This involves checking for unauthorized modifications to kernel modules and system calls.
- Memory Forensics: Regularly conduct memory analysis on critical Linux systems. This is one of the few effective ways to identify the presence of rootkits and kernel-level implants that hide from disk-based scanning.
- Assume Breach Mentality: Operate under the assumption that privileged segments of your network could be compromised. Implement strict network segmentation and micro-segmentation to limit lateral movement.
- Egress Traffic Filtering: While SKIPPER is a passive backdoor, data exfiltration still requires outbound connections. Scrutinize all egress traffic from critical server segments and block any connections that are not explicitly authorized.
- Least Privilege Access: Enforce strict access controls for all systems, especially those with administrative or root privileges. Gaining kernel-level access often requires an initial compromise that escalates privileges.
For Individuals:
While you cannot control your ISP's security, you can take steps to protect your own data as it transits their network. Use services that offer end-to-end encryption for all communications. For general web browsing and other activities, using a reputable VPN service can encrypt your traffic, making it unreadable to anyone snooping on the network, including a compromised provider.
The discovery of Unfading Sea Haze is a sobering reminder that the battle for control over our digital infrastructure is being waged in the deepest, most critical parts of the network. It highlights the continuous need for advanced threat detection and a proactive security posture to defend against highly resourced and patient adversaries.




