Security researchers have identified a sophisticated cyber-espionage campaign targeting telecommunications providers in South America. The activity is attributed to a newly designated, suspected China-linked threat actor, UAT9244. The campaign is characterized by its use of a novel, custom malware toolkit designed for long-term persistence and intelligence gathering. The toolkit includes multiple backdoors—TernDoor, PeerTime, and BruteEntry—enabling the attackers to maintain a covert presence within the critical telecom networks. This operation underscores the strategic importance of the telecommunications sector to nation-state actors for conducting surveillance and collecting sensitive intelligence.
The primary objective of UAT9244 appears to be long-term espionage. By compromising telecommunications providers, a nation-state actor can gain access to vast amounts of data, including call detail records, internet traffic, and sensitive customer information. This access can be used to monitor dissidents, track foreign officials, or gather economic intelligence.
The group's custom malware toolkit demonstrates a significant investment in developing tools to evade detection:
The use of a multi-component, undocumented malware suite indicates that UAT9244 is a capable and well-resourced threat actor, consistent with state sponsorship.
The attack likely follows a classic APT lifecycle:
Detecting this custom malware requires behavioral analysis and threat hunting:
| Type | Value | Description |
|---|---|---|
| process_name | Unsigned executables running from unusual directories | Look for any unknown or unsigned binaries running in directories like C:\ProgramData\ or C:\Temp\. |
| network_traffic_pattern | Encrypted traffic to non-standard ports or unknown IPs | Monitor for persistent, low-and-slow C2 traffic from critical servers to unfamiliar IP addresses. |
| log_source | Authentication Logs | A high rate of failed logins from a single internal source host could indicate the BruteEntry tool in action. |
| file_name | terndoor.dll, peertime.exe |
Specific filenames associated with the malware toolkit, if they can be identified. |
New details on UAT-9244's campaign reveal it's active since 2024, overlaps with FamousSparrow, and uses platform-specific malware with advanced C2 techniques like BitTorrent.
Further analysis of the UAT-9244 campaign indicates the group has been active since at least 2024 and shows operational overlaps with the known threat cluster 'FamousSparrow'. New technical details specify that 'TernDoor' is a Windows backdoor, a variant of 'CrowDoor', utilizing DLL Side-Loading (T1574.002) for evasion. 'PeerTime' is designed for Linux systems and embedded network devices, notably employing the BitTorrent protocol for C2 communications (T1071.003) to blend with legitimate traffic. 'BruteEntry' is described as a brute-force scanning tool installed on compromised network edge devices, turning them into scanning platforms. These details highlight increased sophistication and a broader attack surface.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats