Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: New Linux Malware GTPDOOR Targets Telecom Networks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

New Linux Malware GTPDOOR Targets Telecom Networks

Highlights

  • Linux malware GTPDOOR infiltrates telecom networks.

  • Uses GPRS Tunnelling Protocol for covert control.

  • Recommendations for telecom industry security issued.

Kaan Demirel
Last updated: 1 March, 2024 - 11:59 am 11:59 am
Kaan Demirel 1 year ago
Share
SHARE

Breaking new ground in cyber espionage, a sophisticated Linux malware has been detected, designed explicitly to breach telecommunications networks. This latest threat, known as GTPDOOR, utilizes the GPRS Tunnelling Protocol (GTP) to establish a covert command and control (C2) link, masquerading its malicious communications amidst regular GTP-C signaling traffic.

Contents
Stealthy C2 Communications Leveraging GPRSUncovering the Intricacies of GTPDOORImplications for Global Telecommunications

Stealthy C2 Communications Leveraging GPRS

GTPDOOR is bespoke to manipulate the telecommunications’ backbone, where it integrates seamlessly with the GTP-C signaling utilized by numerous network elements within a telco’s infrastructure. The malware is adept at remaining under the radar, executing remote code, and responding to beckoning TCP packets while subtly embedding its responses within TCP header flags to avoid detection.

Uncovering the Intricacies of GTPDOOR

Comparable to its predecessor BPFDOOR, GTPDOOR employs a nuanced form of port knocking but distinguishes itself by targeting GTP-C echo request/response messages and filtering based on UDP and GTP header values. Not only does GTPDOOR operate on a sophisticated level, but it also shares potential links to known threat actors UNC1945 and LightBasin, who have a history of using the GTP protocol for malicious purposes.

Implications for Global Telecommunications

The implications of GTPDOOR’s stealthy operations are monumental for telecommunications firms globally. This malware can insinuate itself deep into the core networks of telcos, targeting systems central to the GTP-C over GRX, such as SGSN, GGSN, and P-GW. Its TCP probing capabilities allow for the identification of active implants within the GRX network, presenting a substantial risk to the security and integrity of telecommunications infrastructure.

This new strain of malware has drawn the attention of cybersecurity communities. In their analysis, Double Agent highlights the intricacies of GTPDOOR and its potential to disrupt telecommunications systems, which are integral to the functioning of our increasingly connected world. The findings by CrowdStrike further expose the presence of a Solaris version of this malware, indicating its widespread application and the sophistication of its developers.

These revelations have not gone unnoticed within the wider scope of cybersecurity news. Security Affairs, in their article “New Threat on the Block: GTPDOOR Malware Targets Telcos,” delves into the broader implications of this malware on the telecommunication industry. Furthermore, Infosecurity Magazine, in “GTPDOOR: The New Silent Menace to Telecoms,” discusses the strategic significance of the malware’s choice of GTP-C signaling, which is crucial for mobile operators. These discussions underscore the gravity of the threat and the need for heightened vigilance and cybersecurity measures within the industry.

As the cyber warfare landscape continues to evolve, entities operating within and alongside the telecommunications sector are urged to adopt stringent security protocols. These include selective opening of UDP ports on GRX, robust firewall rules, and the proactive blocking of unnecessary inbound TCP connections. By doing so, the industry can safeguard against the likes of GTPDOOR and other similar threats lurking in the digital shadows.

The discovery of GTPDOOR signals a clear and present danger to the telecommunications industry, necessitating a reassessment of security measures to protect the critical infrastructure that connects our world.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

DHS Faces Scrutiny for Withholding CISA Workforce Details

MITRE’s CVE Program Faces Funding Shake-up and Future Alternatives

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Diablo 4 Ushers in Season 4 with Major Updates and PTR Access
Next Article Elon Musk Takes Legal Action Against OpenAI for Mission Betrayal

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Pushed by Tesla, Panasonic Boosts US Battery Cell Production
Electric Vehicle
Satellite Companies Advance IoT with New Innovations
IoT
Wordle Enthusiasts Crack Today’s Puzzle with Strategic Tips
Gaming
OpenAI Targets UAE for New Data Center
AI Technology
Waymo Recalls 1,200 Robotaxis Over Software Glitch
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?