
Red Menshen: A Look into the Chinese Cyber Espionage Threat
BPFDoor
Red Dev 18
Red Menshen, a China based threat actor, which has been observed targeting telecommunications providers across the U.S, Turkey, Middle East and Asia, as well as entities in the government, education, and logistics sectors using a custom backdoor referred as BPFDoor.
Domains | Source | Last Update |
---|
Hashes | Source | Last Update |
---|---|---|
f1bf775746a5c882b9ec003617b2a70cf5a5b029 | SOCRadar | 2023-02-01 |
ca73295816ca7b693471803274115457a156ecb2 | SOCRadar | 2023-02-01 |
e935bbdc493017ff6b427d194c81063125705259 | SOCRadar | 2023-02-01 |
07ecb1f2d9ffbd20a46cd36cd06b022db3cc8e45b1ecab62cd11f9ca7a26ab6d | SOCRadar | 2023-02-01 |
2bc4dfec30893df28357e8affae068b32f0796d8 | SOCRadar | 2023-02-01 |
27fc5359c0200cb33b328048d317605c255db6ea | SOCRadar | 2023-02-01 |
0e214a3bb9955b9b792d0ef785beee212a26c7fd | SOCRadar | 2023-02-01 |
3a270b673d47c0b69c3baf5d73010773 | SOCRadar | 2023-02-01 |
87223f2a9c3a65be7545f25f95e10ece | SOCRadar | 2023-02-01 |
96e906128095dead57fdc9ce8688bb889166b67c9a1b8fdb93d7cff7f3836bb9 | SOCRadar | 2023-02-01 |
8f05657f0bd8f4eb60fba59cc94fe189 | SOCRadar | 2023-02-01 |
46cc04585e4fd8181470c7f0359d7b18a52211dc | SOCRadar | 2023-02-01 |
76bf736b25d5c9aaf6a84edd4e615796fffc338a893b49c120c0b4941ce37925 | SOCRadar | 2023-02-01 |
599ae527f10ddb4625687748b7d3734ee51673b664f2e5d0346e64f85e185683 | SOCRadar | 2023-02-01 |
5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9 | SOCRadar | 2023-02-01 |
ed0cd45c3bb95ef8da214048799395e247040d17 | SOCRadar | 2023-02-01 |
aa78b0d9c6351cb664780d9203a331a9 | SOCRadar | 2023-02-01 |
11daa1c8a3846d9ef3d030efb51c2e14 | SOCRadar | 2023-02-01 |
156226c90974180cc4b5f9738e80f1f8 | SOCRadar | 2023-02-01 |
057b1783e8829e34e0c544c770360215fb60b7bb | SOCRadar | 2023-02-01 |
65e4d507b1de3a1e4820e4c81808fdfd7e238e10 | SOCRadar | 2023-02-01 |
fd1b20ee5bd429046d3c04e9c675c41e9095bea70e0329bd32d7edd17ebaf68a | SOCRadar | 2023-02-01 |
8535c3b18a10649b94531c6d9f79750324498e5c | SOCRadar | 2023-02-01 |
c80bd1c4a796b4d3944a097e96f384c85687daeedcdcf05cc885c8c9b279b09c | SOCRadar | 2023-02-01 |
0017f7b913ce66e4d80f7e78cf830a2b | SOCRadar | 2023-02-01 |
b65d8705c8d30ccc855e0dc48f093591 | SOCRadar | 2023-02-01 |
eb9c1fc238d078f49a33442e8adaa73f | SOCRadar | 2023-02-01 |
f47de978da1dbfc5e0f195745e3368d3ceef034e964817c66ba01396a1953d72 | SOCRadar | 2023-02-01 |
85f538110d3e59bef69119db03932b16 | SOCRadar | 2023-02-01 |
915ca30a12f19152e6ee7fcd595b7b41 | SOCRadar | 2023-02-01 |
4c5cf8f977fc7c368a8e095700a44be36c8332462c0b1e41bff03238b2bf2a2d | SOCRadar | 2023-02-01 |
92439c3c736a0554883118ecfe082b27aa6c9143 | SOCRadar | 2023-02-01 |
5fda35bd30be1cc21f8e933e41a88d9b | SOCRadar | 2023-02-01 |
97a546c7d08ad34dfab74c9c8a96986c54768c592a8dae521ddcf612a84fb8cc | SOCRadar | 2023-02-01 |
83023ecfc4836df0a25eec8826cbb80c | SOCRadar | 2023-02-01 |
5faab159397964e630c4156f8852bcc6ee46df1cdd8be2a8d3f3d8e5980f3bb3 | SOCRadar | 2023-02-01 |
851d9a438b9bf3e9b0dc65fb2d18d6f3636ad71c | SOCRadar | 2023-02-01 |
93f4262fce8c6b4f8e239c35a0679fbbbb722141b95a5f2af53a2bcafe4edd1c | SOCRadar | 2023-02-01 |
3a2a08c0f98389d8def6fe82fcb3cc1b | SOCRadar | 2023-02-01 |
f8a5e735d6e79eb587954a371515a82a15883cf2eda9d7ddb8938b86e714ea27 | SOCRadar | 2023-02-01 |
5c2aa2735f5c925fd309b41d02f29473448aea68 | SOCRadar | 2023-02-01 |
fa0defdabd9fd43fe2ef1ec33574ea1af1290bd3d763fdb2bed443f2bd996d73 | SOCRadar | 2023-02-01 |
c796fc66b655f6107eacbe78a37f0e8a2926f01fecebd9e68a66f0e261f91276 | SOCRadar | 2023-02-01 |
Ipv4s | Source | Last Update |
---|
Cves | Source | Last Update |
---|
Emails | Source | Last Update |
---|
Domains | Insert Date |
---|
T1036.005- Masquerading: Match Legitimate Name or Location
T1070.004- Indicator Removal on Host: File Deletion
T1070.006- Indicator Removal on Host: Time Stomp
T1059.004- Command and Scripting Interpreter: Unix Shell
T1106- Native API
T1548.001- Abuse Elevation Control Mechanism: Setuid and Setgid
T1095- Non-Application Layer Protocol
Mitigation:
- Awareness: Ensure that employees and stakeholders are aware of the threat posed by BPFDoor and the importance of following security best practices, such as avoiding suspicious emails and links and keeping software up-to-date.
- Patch Management: Regularly apply security patches and updates to the operating system, applications, and firmware to close any vulnerabilities that may be exploited by attackers.
- Endpoint protection: Implement robust endpoint protection solutions to detect and prevent the spread of malware, including BPFDoor.
- Network Segmentation: Segment the network into smaller, secure zones to reduce the attack surface and limit the spread of malware if a breach occurs.
- Backup and Recovery: Regularly back up critical data and implement a robust disaster recovery plan to ensure that business operations can continue in the event of a successful attack.
- Monitoring: Monitor the network for unusual activity and implement security tools such as intrusion detection systems and log analysis tools to detect any potential threats.
- Incident Response Plan: Have an incident response plan in place to quickly and effectively respond to a breach or attack, including procedures for isolating affected systems and preserving evidence for forensic analysis.
Backdoor:Linux/BPFDoor.E!MTB REF
Detected by Microsoft Defender Antivirus
Aliases: No associated aliases
Summary
Microsoft Defender Antivirus detects and removes this threat.
This threat can give a malicious hacker unauthorized access and control of your PC.
What to do now
Use the following free Microsoft software to detect and remove this threat:
Windows Defender for Windows 10 and 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
Microsoft Safety Scanner
You should also run a full scan. A full scan might find other hidden malware.
Get more help
You can also see our advanced troubleshooting page for more help.
If you’re using Windows XP, see our Windows XP end of support page.
Introduction:
Cybersecurity threats are becoming more and more sophisticated, and advanced persistent threat (APT) groups are a major cause for concern. One such group that has been active since is Red Menshen, a China-based APT group that has been conducting cyber espionage operations against government agencies, military organizations, corporations, and more. In this post, we'll take a closer look at the threat posed by Red Menshen and its custom backdoor, BPFDoor.
About Red Menshen:
Red Menshen is a highly effective and persistent APT group that has been targeting a variety of organizations across the globe. The group is known for its use of custom-built tools, making it a formidable threat. Some of the sectors that have been targeted by Red Menshen include telecommunications providers, government entities, education institutions, and logistics companies.
BPFDoor: A Custom Backdoor
One of the tools used by Red Menshen is BPFDoor, a custom backdoor that has been observed in attacks against organizations in the US, South Korea, Hong Kong, Turkey, India, Viet Nam, Myanmar, and more. BPFDoor is used by the group to gain unauthorized access to targeted systems and carry out post-exploitation activities, such as stealing sensitive information and moving laterally within the network.
BPFDoor is a highly evasive backdoor that doesn't open any inbound network ports, doesn't use an outbound command and control (C2), and renames its own process in Linux. This makes it difficult for security systems to detect.
Florian Roth found BPFDoor controller source code
Sample
https[:]//virustotal[.]com[/]gui[/]file[/]8b9db0bc9152628bdacc32dab01590211bee9f27d58e0f66f6a1e26aea7552a6[/]detection
Source
https[:]//pastebin[.]com[/]kmmJuuQP
File Name | Description | Actions |
---|---|---|
yir-cyber-threats-report-download.pdf | Red Dev Redemption | |
BPFDoor — an active Chinese global surveillance tool _ by Kevin Beaumont _ DoublePulsar.pdf | BPFDoor is interesting. It allows a threat actor to backdoor a system for remote code execution |
APT Name | Aliases | Target Countries | Source Countries | Total IOCs |
---|---|---|---|---|
Red Menshen |
RedDev18
|
|
None |
42
|