BPFDoor Malware Uncovered: Stealthy Rootkit Uses Reverse Shell for Deep Infiltration

A newly discovered controller linked to the state-sponsored BPFDoor malware has been used in cyber espionage campaigns targeting the telecommunications, finance, and retail sectors across South Korea, Hong Kong, Myanmar, Malaysia, and Egypt.

This controller, attributed to the advanced persistent threat (APT) group Earth Bluecrow (also known as Red Menshen), enables attackers to infiltrate deeper into compromised networks by opening reverse shells and redirecting connections.

Overview of BPFDoor Malware

BPFDoor is a highly stealthy backdoor malware that leverages Berkeley Packet Filtering (BPF) technology.

BPF allows the malware to inspect network packets at the kernel level, bypassing firewalls and remaining undetected during routine security scans.

The malware activates upon receiving network packets containing specific “magic sequences,” enabling attackers to execute commands on infected machines without raising suspicion.

The malware’s ability to evade detection stems from its rootkit-like features, including changing process names and avoiding port listening.

These capabilities make BPFDoor an ideal tool for long-term espionage operations.

Recent Targets and Techniques

Trend Micro’s telemetry indicates that BPFDoor attacks have intensified in recent months, focusing on Linux servers in the Asia, Middle East, and Africa (AMEA) regions. The industries targeted include:

  • Telecommunications: South Korea (July 2024, December 2024), Hong Kong (January 2024), Myanmar (December 2024)
  • Retail: Malaysia (October 2024)
  • Financial Services: Egypt (September 2024)

Attackers use various techniques to hide malicious files within compromised systems, such as storing them in paths like /tmp/zabbix_agent.log or /bin/vmtoolsdsrv. These files serve as initial entry points for further infiltration.

Capabilities of the Hidden Controller

The newly identified controller adds significant functionality to BPFDoor attacks.

It supports multiple protocols—TCP, UDP, and ICMP—and offers options for encryption and password authentication.

Key features include:

  • Reverse Shells: Attackers can open encrypted reverse shell sessions to control infected machines remotely.
  • Direct Connections: The controller can directly connect to infected hosts using TCP ports.
  • Magic Sequence Customization: Attackers can manually set magic sequences to avoid detection by defenders.

The controller uses hard-coded passwords combined with MD5 hashing for authentication.

Once authenticated, it allows attackers to execute commands or redirect connections on infected systems.

Technical Demonstrations

Trend Micro researchers demonstrated how attackers use the controller to establish reverse shell sessions.

For instance, an attacker machine with IP 192.168.32.133 can command an infected machine at 192.168.32.156 to connect back using port 8000/tcp.

This process involves sending activation packets containing the magic sequence, IP address, port number, and password.

In addition to TCP mode, attackers can exploit UDP or ICMP protocols if TCP ports are unavailable.

ICMP mode is particularly concerning as it enables communication even when no internet-facing ports are open.

Defensive Measures

To counter BPFDoor’s stealthy operations, Trend Micro recommends monitoring network packets for specific patterns:

  • TCP payloads, starting with 0x5293
  • UDP payloads beginning with 0x7255
  • ICMP packets containing similar magic sequences

However, defenders must employ deeper packet analysis due to the controller’s ability to customize magic bytes.

Attribution and Outlook

Trend Micro attributes these campaigns to Earth Bluecrow with medium confidence based on coding similarities and targeting patterns.

While BPFDoor’s source code was leaked in 2022, no other groups have been linked to similar operations since then.

Looking ahead, researchers warn that BPF technology could be exploited more broadly across Linux systems and potentially adapted for Windows environments.

Proactive measures such as analyzing BPF code and deploying advanced intrusion prevention systems are critical.

Proactive Security Solutions

Trend Micro offers robust protection against BPFDoor through its Trend Vision One™ platform.

This AI-powered cybersecurity solution provides real-time threat intelligence and hunting queries for identifying malicious indicators within enterprise environments.

By leveraging tools like Deep Discovery Inspector and TippingPoint Intrusion Prevention filters, organizations can mitigate risks posed by BPFDoor and other emerging threats effectively.

As cyber espionage campaigns evolve, vigilance against stealthy backdoors like BPFDoor remains essential for safeguarding critical infrastructure across global industries.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here