Monday, April 28, 2025
HomeCyber Security NewsBPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

Published on

SIEM as a Service

Follow Us on Google News

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight as a stealthy and dangerous tool for compromising networks.

According to security experts at Trend Micro, BPFDoor is a state-sponsored backdoor attributed to the advanced persistent threat (APT) group known as Earth Bluecrow (also referred to as Red Menshen).

This malware exploits reverse shells and sophisticated Berkeley Packet Filtering (BPF) techniques to infiltrate and control systems across telecommunications, finance, and retail sectors in regions such as South Korea, Hong Kong, Myanmar, Malaysia, and Egypt.

- Advertisement - Google News

Understanding BPFDoor Malware

BPFDoor, a backdoor detected as Backdoor.Linux.BPFDOOR, is uniquely powerful due to its reliance on BPF, a kernel-level packet filtering technology.

The logon() function from a BPFDoor sample
The logon() function from a BPFDoor sample

While its core functionalities resemble rootkits, BPFDoor distinguishes itself through its ability to remain undetected by firewalls and evade conventional network scans.

The malware activates upon receipt of “magic sequences” — specific byte strings embedded in network packets — that trigger predefined actions on the target machine.

The primary stealth capabilities of BPFDoor include changing process names, avoiding port listening, and bypassing security logs.

This makes it highly suitable for long-term espionage, allowing attackers to embed themselves deeply within a network without raising suspicion.

Reverse connection mode process flow
Reverse connection mode process flow

Reverse Shell Technique and Lateral Movement

One of BPFDoor’s alarming capabilities is its use of reverse shells to expand control over infected systems.

A reverse shell allows attackers to run commands remotely on compromised servers by reversing the typical client-server communication model. Through this mode, attackers can move laterally across networks to access sensitive data or control additional systems.

Using a custom controller, threat actors deploy reverse shells via three protocols: TCP, UDP, and ICMP. Once activated, the malware communicates with the attacker’s system by bypassing standard security defenses.

TCP packet sent by the BPFDoor controller to the target with its payload highlighted
TCP packet sent by the BPFDoor controller to the target with its payload highlighted

For example, a controller command can ask BPFDoor to open an encrypted reverse shell session between an infected host and an attacker’s machine, enabling seamless remote access.

The controller also allows attackers to modify parameters like passwords, magic sequences, and destination ports, enhancing customization for varying targets.

Such versatility enables Earth Bluecrow to adapt its attacks for different industries and geographies.

Targets and Defense Mechanisms

Trend Micro’s investigation revealed BPFDoor primarily targets Linux-based servers in sectors critical to national and corporate security.

Recent attacks have been observed on telecommunications providers in South Korea and Myanmar, financial institutions in Egypt, and retail businesses in Malaysia.

Defenders are urged to monitor network activity for unusual TCP, UDP, or ICMP packets containing suspicious magic sequences or patterns indicative of BPFDoor activity.

Packet sent by the BPFDoor controller in ICMP mode
Packet sent by the BPFDoor controller in ICMP mode

BPFDoor’s ability to use reverse shells, combined with its stealthy nature, poses significant risks to organizations worldwide.

As Earth Bluecrow continues to refine its techniques, companies must bolster their defenses to protect against this advanced cyber espionage tool.

Detection, response, and proactive security measures are critical to countering BPFDoor and safeguarding sensitive networks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...