UAT-9244: China-Nexus APT Deploys Three New Malware Implants Against South American Telecom Providers

Cisco Talos has disclosed a new threat activity cluster, UAT-9244, assessed with high confidence to be a China-nexus advanced persistent threat (APT) actor closely associated with FamousSparrow and Tropic Trooper. Since 2024, the group has targeted critical telecommunications infrastructure in South America with three distinct malware implants.

Key Findings

  • TernDoor: A new Windows backdoor variant of CrowDoor, deployed via DLL side-loading with capabilities for remote shell, file operations, and process management using an embedded kernel driver
  • PeerTime: An ELF-based backdoor using the BitTorrent protocol for C2 communication, compiled for multiple architectures (ARM, AARCH, PPC, MIPS) to target embedded systems
  • BruteEntry: A brute force scanner installed on network edge devices, converting them into Operational Relay Boxes (ORBs) that scan and compromise SSH, Postgres, and Tomcat servers

TernDoor Technical Details

The infection chain begins with DLL side-loading via the benign executable “wsprint.exe,” which loads the malicious “BugSplatRc64.dll.” The loader decrypts payloads using the key “qwiozpVngruhg123” and executes TernDoor in memory.

TernDoor establishes persistence through scheduled tasks or Registry Run keys and includes an embedded Windows driver (WSPrint.sys) that creates the device “\\Device\\VMTool” for process management—likely for evasion purposes.

PeerTime: P2P Backdoor

PeerTime uses BitTorrent protocol to obtain C2 information and download payloads. The malware includes debug strings in Simplified Chinese, indicating Chinese-speaking developers. Two versions exist: one in C/C++ and a newer Rust variant.

The malware checks for Docker presence and renames its process to evade detection. It uses BusyBox to copy payloads to specified locations.

BruteEntry ORB Infrastructure

BruteEntry transforms compromised Linux devices into scanning nodes that brute force internet-facing services:

  • Registers with C2 using the infected system’s IP and hostname
  • Receives batches of up to 1,000 target IPs to scan
  • Attempts credential stuffing against Tomcat (/manager/html), PostgreSQL (port 5432), and SSH
  • Reports successful logins back to C2

Infrastructure and Attribution

All discovered C2 IP addresses shared a common SSL certificate pattern. Pivoting off this certificate, Talos identified 18 additional suspected UAT-9244 IPs.

Based on tooling overlap, TTPs, and victimology, Talos assesses UAT-9244 closely overlaps with FamousSparrow and Tropic Trooper. While both UAT-9244 and Salt Typhoon target telecommunications providers, no solid connection between the two clusters has been established.

Indicators of Compromise

Key C2 infrastructure includes:

  • 154[.]205[.]154[.]82:443
  • 207[.]148[.]121[.]95:443
  • 212[.]11[.]64[.]105
  • bloopencil[.]net
  • xtibh[.]com

Full IOCs including hashes for TernDoor loaders, PeerTime samples, and BruteEntry agents are available in the Cisco Talos research report.

Why This Matters

This campaign demonstrates the continued focus of China-nexus actors on telecommunications infrastructure—a strategic target for intelligence collection and potential disruption. The use of P2P protocols and ORB networks shows sophisticated operational security and the ability to scale attacks while maintaining anonymity.

Organizations in the telecommunications sector should review their edge device security, implement robust credential policies, and monitor for the IOCs provided by Talos.

One thought on “UAT-9244: China-Nexus APT Deploys Three New Malware Implants Against South American Telecom Providers

Comments are closed.