Monday, May 12, 2025
Homecyber securityBFDOOR Malware Targets Organizations to Establish Long-Term Persistence

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

Published on

SIEM as a Service

Follow Us on Google News

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations, particularly in the telecommunications sector.

First identified by PwC in 2021, BPFDoor is a highly sophisticated backdoor malware designed to infiltrate Linux systems with an emphasis on long-term persistence and evasion.

On April 25, 2025, the Korea Internet & Security Agency (KISA) issued a security advisory after confirming its distribution to critical systems, highlighting the growing frequency of these attacks.

- Advertisement - Google News

According to S2W’s Threat Research and Intelligence Center (TALON) Report, which recently analyzed the malware, BPFDoor exploits Berkeley Packet Filter (BPF) technology-a kernel-level networking tool originally intended for efficient packet filtering-to achieve unparalleled stealth.

By using 229 BPF Instruction Sets, the malware filters specific trigger packets, enabling it to receive commands without opening traditional network ports, thus blending malicious traffic seamlessly with legitimate data.

Advanced Features and Attribution to Earth Bluecrow

BPFDoor’s technical sophistication lies in its ability to support non-standard communication protocols such as TCP, UDP, and ICMP, employing magic sequences like 0x5293, 0x39393939, and 0x7255 to mask its activities within normal traffic.

BFDOOR Malware
BPFDoor operation flow

Its advanced anti-forensic techniques-including process name masquerading, daemonization, and memory-based execution-make detection incredibly challenging.

The malware also uses reverse shell capabilities and encrypted communication channels, sometimes leveraging outdated RC4-MD5 suites or self-signed SSL certificates, to obscure its command-and-control interactions.

Notably, BPFDoor has been exclusively linked to the Chinese-backed APT group Earth Bluecrow (also known as Red Menshen), with consistent communication patterns and magic sequences reinforcing this attribution.

S2W’s analysis indicates that attackers deploy BPFDoor for lateral movement within compromised networks, ensuring prolonged access to targeted systems.

This persistence is further aided by features like mutex file creation to prevent duplicate execution and privilege checks to ensure root-level access, demonstrating meticulous design for sustained infiltration.

BFDOOR Malware
 Characteristics of BPFDoor malware by version

Mitigation Strategies Amid Rising Threats

The implications of BPFDoor’s capabilities are profound, as evidenced by the public release of its source code on GitHub in 2022, potentially enabling variants and wider exploitation.

S2W and KISA recommend robust mitigation strategies to counter this threat, emphasizing pre-infection detection through BPF filter queries, magic sequence searches, and monitoring for hardcoded salt strings used in password hashing.

Organizations managing Linux servers are urged to vigilantly monitor socket connections, inspect for executable file tampering, and verify process name integrity.

S2W has also provided YARA rules to detect known samples and variants of BPFDoor, enhancing defensive capabilities.

As this malware continues to evolve, with differences in controller options and hardcoded values observed across versions, the cybersecurity community must prioritize behavior-based detection over static indicators.

The battle against BPFDoor underscores the critical need for advanced monitoring and proactive threat hunting to safeguard critical infrastructure from such insidious, persistent threats orchestrated by state-sponsored actors like Earth Bluecrow.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...