Original Article Text

Click to Toggle View

Stealthy GTPDOOR Linux malware targets mobile operator networks. Security researcher HaxRob discovered a previously unknown Linux backdoor named GTPDOOR, designed for covert operations within mobile carrier networks. The threat actors behind GTPDOOR are believed to target systems adjacent to the GPRS roaming eXchange (GRX), such as SGSN, GGSN, and P-GW, which can provide the attackers direct access to a telecom's core network. The GRX is a component of mobile telecommunications that facilitates data roaming services across different geographical areas and networks. While the Serving GPRS Support Node (SGSN), Gateway GPRS Support Node (GGSN), and P-GW (Packet Data Network Gateway (for 4G LTE) are components within a mobile operator's network infrastructure, each serving different roles in mobile communications. As the SGSN, GGSN, and P-GW networks are more exposed to the public, with IP address ranges listed in public documents, the researcher believes they are the likely target for gaining initial access to the mobile operator's network. In his write-up, HaxRob explained that GTPDOOR is likely a tool belonging to the 'LightBasin' threat group (UNC1945), notorious for intelligence-collection operations targeting multiple telcos worldwide. The researcher discovered two versions of the backdoor uploaded to VirusTotal in late 2023, both passing largely undetected by antivirus engines. The binaries targeted a very old Red Hat Linux version, indicating an outdated target. The stealthy GTPDOOR operation GTPDOOR is a sophisticated backdoor malware tailored for telecommunications networks, leveraging the GPRS Tunnelling Protocol Control Plane (GTP-C) for covert command and control (C2) communications. It is designed for deployment in Linux-based systems adjacent to the GRX, responsible for routing and forwarding roaming-related signaling and user plane traffic. Using GTP-C for communication allows GTPDOOR to blend with legitimate network traffic and utilize already permitted ports that aren't monitored by standard security solutions. For additional stealth, GTPDOOR can change its process name to mimic legitimate system processes. The malware listens for specific GTP-C echo request messages ("magic packets") to wake up and execute the given command on the host, sending the output back to its operators. The contents of the magic GTP packets are authenticated and encrypted using a simple XOR cipher, ensuring that only authorized operators can control the malware. GTPDOOR v1 supports the following operations on breached hosts: GTPDOOR v2 supports the above operations plus the following: HaxRob also highlights the malware's ability to be covertly probed from an external network, eliciting a response via a TCP packet passed through any port. Detection and defense Detection strategies involve monitoring for unusual raw socket activities, unexpected process names, and specific malware indicators such as duplicate syslog processes. The recommended detection steps are the following: The following YARA rule for defenders to detect the GTPDOOR malware has also been provided. Finally, the researcher proposes defense measures such as GTP firewalls with strict rules and adherence to GSMA security guidelines (1, 2) to block or filter out malicious packets and connections.

Daily Brief Summary

MALWARE // Stealthy GTPDOOR Malware Targets Global Mobile Networks

A Linux backdoor named GTPDOOR has been discovered targeting mobile operator networks.

GTPDOOR is believed to be associated with the threat group LightBasin (UNC1945), known for infiltrating telecommunications systems.

The malware infiltrates systems critical to mobile communications like SGSN, GGSN, and P-GW, potentially accessing a telecom’s core network.

Using the GPRS Tunnelling Protocol Control Plane, GTPDOOR camouflages its communications to avoid detection.

It listens for specific "magic packets" to activate and perform operations, maintaining stealth through encrypted and authenticated packets.

Antivirus engines struggle to detect GTPDOOR, as it targets outdated Linux versions and can masquerade its process name.

Detection strategies include monitoring for abnormal socket activities and process names, with proposed defenses such as GTP firewalls and GSMA security guidelines.