GTPDOOR: The Stealthy Linux Backdoor Targeting Telecom Networks

by | Mar 4, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

In a recent revelation, security researcher HaxRob has uncovered a previously unknown Linux backdoor named GTPDOOR, meticulously crafted for clandestine operations within mobile carrier networks.

Believed to be orchestrated by threat actors targeting systems adjacent to the GPRS Roaming Exchange (GRX), such as SGSN, GGSN, and P-GW, GTPDOOR provides direct access to a telecom’s core network, posing a significant threat to telecommunications infrastructure.

GRX, an integral component facilitating data roaming services across diverse networks and geographical areas, hosts these crucial systems, each playing distinct roles in mobile communications.

With the SGSN, GGSN, and P-GW networks more exposed to the public eye, with IP addresses readily available in public documents, they become prime targets for initial access into a mobile operator’s network, as explained in HaxRob’s detailed analysis.

Attributed to the ‘LightBasin’ threat group (UNC1945), known for its intelligence-collection operations targeting telcos worldwide, GTPDOOR was discovered in two versions uploaded to VirusTotal in late 2023, evading detection by antivirus engines. The backdoor specifically targeted an outdated version of Red Hat Linux, hinting at its intended vulnerabilities.

Samples

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

GTPDOOR: A Stealthy Threat

GTPDOOR, a sophisticated backdoor malware, capitalizes on the GPRS Tunnelling Protocol Control Plane (GTP-C) for covert command and control (C2) communications. Specifically designed for deployment in Linux-based systems neighboring the GRX, GTPDOOR seamlessly integrates with legitimate network traffic, utilizing unmonitored ports for stealthy operations.

The malware’s ability to modify its process name to mimic legitimate system processes further enhances its covert nature. It awaits specific GTP-C echo request messages, known as “magic packets,” to activate and execute commands, subsequently relaying outputs to its operators.

Malicious packet structureMalicious packet structure (doubleagent.net)

Malicious Packet Structure

The content within the magic GTP packets is both authenticated and encrypted using a simple XOR cipher, ensuring only authorized operators can control the malware.

GTPDOOR’s functionalities include setting new encryption keys, writing arbitrary data to local files, executing shell commands, and sending back results. Version 2 introduces additional capabilities, such as specifying allowed IP addresses or subnets and dynamically adjusting network permissions.

GTPDOOR attack overviewGTPDOOR attack overview (doubleagent.net)




Detection and Defense

Detection strategies encompass monitoring raw socket activities, anomalous process names, and specific indicators like duplicate syslog processes. Recommended steps include scrutinizing open raw sockets, identifying unusual listening sockets, and searching for mutex files (/var/run/daemon.pid) and unexpected configuration files.

Abnormal PIDAbnormal PID (doubleagent.net)

To aid defenders, a YARA rule has been provided for detecting GTPDOOR.

YARA

Furthermore, defense measures, including GTP firewalls and adherence to GSMA security guidelines, are proposed to thwart malicious packet and connection attempts.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This