China-Linked Group UAT9244 Targets South American Telecoms with New Malware Suite

New China-Linked Threat Actor 'UAT9244' Targets South American Telecoms with Custom Malware

HIGH
March 9, 2026
March 10, 2026
5m read
Threat ActorThreat IntelligenceCyberattack

Related Entities(initial)

Threat Actors

UAT9244

Other

BruteEntryPeerTimeTernDoor

Full Report(when first published)

Executive Summary

Security researchers have identified a sophisticated cyber-espionage campaign targeting telecommunications providers in South America. The activity is attributed to a newly designated, suspected China-linked threat actor, UAT9244. The campaign is characterized by its use of a novel, custom malware toolkit designed for long-term persistence and intelligence gathering. The toolkit includes multiple backdoors—TernDoor, PeerTime, and BruteEntry—enabling the attackers to maintain a covert presence within the critical telecom networks. This operation underscores the strategic importance of the telecommunications sector to nation-state actors for conducting surveillance and collecting sensitive intelligence.

Threat Overview

The primary objective of UAT9244 appears to be long-term espionage. By compromising telecommunications providers, a nation-state actor can gain access to vast amounts of data, including call detail records, internet traffic, and sensitive customer information. This access can be used to monitor dissidents, track foreign officials, or gather economic intelligence.

The group's custom malware toolkit demonstrates a significant investment in developing tools to evade detection:

  • TernDoor: A backdoor likely used for initial access and establishing a C2 channel.
  • PeerTime: This implant may have capabilities for lateral movement or peer-to-peer C2 communications to make the network traffic harder to trace.
  • BruteEntry: The name suggests this tool could be used for brute-forcing credentials on internal systems to expand the attackers' foothold within the network.

The use of a multi-component, undocumented malware suite indicates that UAT9244 is a capable and well-resourced threat actor, consistent with state sponsorship.

Technical Analysis

The attack likely follows a classic APT lifecycle:

  1. Initial Access: APTs targeting telecoms often use spear phishing (T1566 - Phishing) targeting network engineers or exploiting vulnerabilities in internet-facing network management systems (T1190 - Exploit Public-Facing Application).
  2. Execution & Persistence: The TernDoor backdoor is deployed to establish a foothold. Persistence is achieved through techniques like creating a new service (T1543.003 - Create or Modify System Process: Windows Service) or a scheduled task (T1053.005 - Scheduled Task/Job: Scheduled Task).
  3. Privilege Escalation & Discovery: The attackers would seek to escalate privileges to gain administrative control over key systems like billing servers, subscriber databases, and network gateways.
  4. Lateral Movement: The BruteEntry tool could be used to crack credentials for other systems, allowing the attackers to move laterally across the network. PeerTime might be used to pivot between compromised hosts within the network.
  5. Collection & Exfiltration: Once they have access to critical systems, the attackers can begin collecting data of interest. Exfiltration would be done stealthily over a long period to avoid detection, likely using encrypted C2 channels (T1041 - Exfiltrate Data Over C2 Channel).

Impact Assessment

  • National Security Risk: The compromise of a national telecommunications provider poses a grave national security risk. It allows a foreign power to monitor government communications, track military and intelligence personnel, and gain insight into a country's infrastructure.
  • Economic Espionage: The attackers can steal sensitive business information from corporate customers of the telecom provider, giving Chinese companies a competitive advantage.
  • Widespread Surveillance: The threat actor could potentially monitor the communications of millions of private citizens and residents.
  • Infrastructure Disruption: While the current focus is espionage, the access gained could be leveraged for disruptive purposes in the future, such as shutting down communications services during a crisis.

Cyber Observables for Detection

Detecting this custom malware requires behavioral analysis and threat hunting:

Type Value Description
process_name Unsigned executables running from unusual directories Look for any unknown or unsigned binaries running in directories like C:\ProgramData\ or C:\Temp\.
network_traffic_pattern Encrypted traffic to non-standard ports or unknown IPs Monitor for persistent, low-and-slow C2 traffic from critical servers to unfamiliar IP addresses.
log_source Authentication Logs A high rate of failed logins from a single internal source host could indicate the BruteEntry tool in action.
file_name terndoor.dll, peertime.exe Specific filenames associated with the malware toolkit, if they can be identified.

Detection & Response

  1. Network Traffic Analysis: Given the target, analyzing NetFlow and DNS traffic is critical. Look for anomalous patterns, such as internal servers communicating with external IPs for the first time or using non-standard protocols. This is a core function of Network Traffic Analysis (D3-NTA).
  2. Endpoint Behavioral Analysis: Deploy EDR on critical servers to detect suspicious behaviors like process injection, credential dumping, and the execution of unsigned code. This aligns with Process Analysis (D3-PA).
  3. Threat Intelligence Integration: Integrate threat intelligence feeds that track Chinese APT activity into your SIEM and security controls to get early warning of known IOCs and TTPs.

Mitigation

  • Network Segmentation: Vigorously segment networks. Core network infrastructure (e.g., SGSN, GGSN in a mobile network) should be highly isolated from IT and corporate networks.
  • Privileged Access Management (PAM): Strictly control and monitor access to critical systems. All administrative access should require MFA and be logged and reviewed.
  • Patch Management: Telecoms run a wide variety of network equipment and software. A rigorous patch management program is essential to reduce the attack surface.
  • Application Whitelisting: On critical servers, use application whitelisting to prevent the execution of any unauthorized software, including the custom malware used by UAT9244. This is a key part of Executable Allowlisting (D3-EAL).

Timeline of Events

1
March 9, 2026
This article was published

Article Updates

March 10, 2026

Severity increased

New details on UAT-9244's campaign reveal it's active since 2024, overlaps with FamousSparrow, and uses platform-specific malware with advanced C2 techniques like BitTorrent.

Further analysis of the UAT-9244 campaign indicates the group has been active since at least 2024 and shows operational overlaps with the known threat cluster 'FamousSparrow'. New technical details specify that 'TernDoor' is a Windows backdoor, a variant of 'CrowDoor', utilizing DLL Side-Loading (T1574.002) for evasion. 'PeerTime' is designed for Linux systems and embedded network devices, notably employing the BitTorrent protocol for C2 communications (T1071.003) to blend with legitimate traffic. 'BruteEntry' is described as a brute-force scanning tool installed on compromised network edge devices, turning them into scanning platforms. These details highlight increased sophistication and a broader attack surface.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTChinaEspionageMalwareTelecommunicationsUAT9244

📢 Share This Article

Help others stay informed about cybersecurity threats