New Telecom Firms Backdoors Discovered

38 views 1 minutes read

New Telecom Firms Backdoors Discovered: In a concerning development, researchers have uncovered novel backdoors designed to maintain persistent access within the networks of Middle Eastern telecom companies.

These backdoors, named HTTPSnoop and PipeSnoop, have been disguised as components of Palo Alto Networks’ Cortex XDR security solution.

Key Takeaways to New Telecom Firms Backdoors Discovered:

  • Researchers have identified new backdoor implants, HTTPSnoop and PipeSnoop, strategically concealed within the infrastructure of telecom firms in the Middle East.
  • HTTPSnoop employs low-level Windows APIs to interact with HTTP devices, decoding incoming data to execute malicious shellcodes.
  • PipeSnoop operates differently, utilizing pre-existing Windows IPC pipes to run shellcode payloads on compromised endpoints, likely intended for high-priority targets.

Unveiling the Backdoor Implants: HTTPSnoop and PipeSnoop

HTTPSnoop: A Stealthy Infiltrator

HTTPSnoop is a deceptive backdoor that operates discreetly by utilizing low-level Windows APIs to directly engage with the HTTP device on the system.

This functionality allows it to bind to specific HTTP(S) URL patterns, where it patiently awaits incoming requests. Upon detection, the implant decodes the accompanying HTTP data, revealing a concealed shellcode that is subsequently executed on the compromised endpoint.

To maintain its covert nature, HTTPSnoop adopts URL patterns reminiscent of those employed by Microsoft’s Exchange Web Services (EWS) platform and OfficeCore’s OfficeTrack, a workforce management solution commonly utilized by telecoms.

PipeSnoop: Targeting High-Priority Endpoints

In contrast, PipeSnoop adopts a different strategy, capable of executing shellcode payloads on infected endpoints. It achieves this by reading from established Windows IPC pipes.

This suggests that PipeSnoop is likely intended for use within compromised enterprise environments, rather than public-facing servers like HTTPSnoop.

Its purpose may be to target endpoints deemed more valuable or high-priority by malicious operators.

Telecom Sector Vulnerabilities

The telecom sector is frequently targeted by various threat actors due to its potential as a conduit for attacks on individuals, businesses, and governments. Given its significant infrastructure role in supporting other businesses, telecom companies bear a great responsibility in mitigating such threats.

As Georgia Bafoutsou, Cybersecurity Officer at the European Union Agency for Cybersecurity (ENISA), emphasizes, the telecom sector often acts as a protective shield, intercepting and thwarting attacks before they reach other industries.

Conclusion

The discovery of these deceptive backdoor implants underscores the critical importance of robust cybersecurity measures within the telecom industry.

As a favored target of threat actors, telecom firms must remain vigilant and resilient in defending their networks against evolving threats.

About Palo Alto Networks:

Palo Alto Networks is a leading cybersecurity company that provides a wide range of security solutions to protect organizations from cyber threats. Cortex XDR is one of its advanced security offerings designed to detect and respond to threats across multiple platforms and environments.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More