China's Secret Cyber Weapon Lies Dormant Inside Global Phone Systems
By 813 Staff
In the last 24 hours, a report from cybersecurity researchers has confirmed what telecom security teams have quietly feared for months: a sophisticated, state-aligned group has successfully deployed kernel-level backdoors within critical telecommunications infrastructure across multiple continents. The findings, first detailed by The Hacker News (@TheHackersNews), point to a China-linked advanced persistent threat (APT) group, tracked under various names including Blackjack and Sandman, which has been embedding "sleeper" implants designed for long-term, undetected access.
Internal documents and forensic analyses show the campaign, active since at least late 2025, targeted network edge devices like enterprise-grade routers and carrier-grade firewalls. The malware operates at the kernel level, the deepest and most privileged part of an operating system, granting attackers near-total control over the compromised device. Engineers close to the project say the implants are not for immediate data theft but for persistent access, acting as a digital beachhead that could be activated for espionage, traffic interception, or even network disruption during a geopolitical crisis. The technical sophistication suggests deep knowledge of the target hardware, pointing to either extensive pre-operation reconnaissance or the exploitation of undisclosed, or "zero-day," vulnerabilities.
The strategic implications are severe. Telecom networks form the backbone of modern communication, carrying everything from corporate data and government communications to personal messages. A kernel-level compromise means traditional antivirus and network monitoring tools are effectively blind to the intrusion, as the malware can manipulate the system's own reporting functions. This isn't a breach of a single company's database; it's a systemic vulnerability planted within the global internet's plumbing. The affected vendors and national cybersecurity agencies have been notified, but the rollout of patches and mitigations has been anything but smooth, given the critical nature of the infrastructure and the complexity of the rootkit.
What happens next involves a delicate and high-stakes remediation effort. Network operators are now racing to conduct forensic audits, a process complicated by the malware's stealth capabilities. The central uncertainty is the full scope of the compromise. While several internet service providers in Europe and Asia have been confirmed as targets, the extent of penetration in North American networks remains unconfirmed. Furthermore, the ultimate "trigger" for these sleeper cells is unknown. The coming weeks will see coordinated disclosure from affected hardware vendors, likely accompanied by a wave of mandatory firmware updates. However, completely eradicating such a deeply embedded threat often requires physically replacing hardware, a costly and logistically daunting prospect that underscores the long-term risk now embedded in global networks.
Source: https://x.com/TheHackersNews/status/2037223289219932391

