radar

ONE Sentinel

securitySecurity/THREATS/CRIT

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

sourceThe Hacker News
calendar_todayMarch 6, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

China-Linked APT Targets South American Telecoms with Advanced Implants

Summary

A China-linked advanced persistent threat (APT) group, tracked as UAT-9244, has been conducting cyberattacks on telecommunications infrastructure in South America since 2024. This group is deploying sophisticated malware implants on Windows, Linux systems, and edge devices.

Key Points

  • The APT group is identified as UAT-9244 and is linked to the FamousSparrow cluster.
  • The attacks have been ongoing since 2024, targeting critical telecom infrastructure.
  • Three implants, TernDoor, PeerTime, and BruteEntry, are used in the attacks.
  • The campaign targets both Windows and Linux systems, as well as edge devices.
  • Cisco Talos is actively tracking this threat actor.

Analysis

The targeting of telecommunications infrastructure by a China-linked APT highlights the strategic importance of these systems and the potential for significant disruption. The use of multiple implants across different operating systems indicates a high level of sophistication and adaptability by the threat actors. This campaign underscores the need for robust security measures in critical infrastructure sectors.

Conclusion

IT professionals should prioritize enhancing security measures for telecommunications infrastructure, focusing on detecting and mitigating threats from advanced persistent threat actors. Regular updates and monitoring of systems are essential to defend against such sophisticated attacks.