• About
  • Subscribe
  • Contact
Monday, April 13, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Computer, Storage, Networks, Connectivity

Rapid7 uncovers state‑sponsored sleeper cells buried in global telecom networks

by FutureCISO Editors
April 13, 2026
Rapid7 uncovers state‑sponsored sleeper cells buried in global telecom networks

Photo by Barnabas Davoti: https://www.pexels.com/photo/tall-cell-towers-9290878/

Share on FacebookShare on Twitter

State‑sponsored “sleeper cells” embedded within global telecommunications networks, offering persistent espionage access that could impact government, corporate, and critical infrastructure communications worldwide.

The Rapid7 investigation, titled Sleeper Cells in the Telecom Backbone, details a multi‑year campaign attributed to a China‑nexus threat actor known as Red Menshen.

According to Rapid7 Labs, the group has shifted from opportunistic intrusion to strategic pre‑positioning — establishing long‑term footholds designed to remain dormant yet provide deep visibility into subscriber and signalling data across 4G and 5G networks.

“If you have access to telecommunications infrastructure, you are not just inside one company, you are operating close to the communication layer of entire populations, which makes this type of access highly valuable and elevates detection to a national‑level concern,” said Raj Samani, chief scientist at Rapid7.

“The activity we are seeing continues to evolve in ways that improve stealth and persistence, and organisations should treat detection as the start of investigation, not the end of it.” Raj Samani

The report highlights how the Red Menshen campaign leverages a Linux kernel‑level backdoor called BPFdoor. This tool operates without opening network ports or producing typical beaconing, leaving standard monitoring blind to its presence. More recent variants hide C2 triggers inside encrypted HTTPS traffic, exploiting SSL termination points such as proxies and load balancers to bypass detection.

Investigators also documented efforts to infiltrate telecommunications signalling systems using SCTP protocols to gain subscriber location and identity data, and to mimic legitimate operational services to blend into network traffic.

“This is not traditional espionage, it is pre‑positioning inside the infrastructure that nations depend on,” said Christiaan Beek, Vice President of Cyber Intelligence at Rapid7. “We are seeing a persistent access model where attackers embed within core communications systems and maintain that access over extended periods.”

Related:  Strategic insights for securing Asia’s software supply chains

To assist defenders, Rapid7 has published an open‑source scanning script capable of detecting both existing and modified BPFdoor samples, encouraging telecom providers and critical sectors to assess exposure proactively.

The findings underscore a pressing challenge for network operators: growing exposure at the intersection of national communications infrastructure and international state‑sponsored cyber operations.

Tags: Rapid7state-sponsored threats

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Rapid7 uncovers state‑sponsored sleeper cells buried in global telecom networks
  • AI lateral movement prompts new Illumio enhancements
  • Exabeam adds visibility into digital workforce interactions
  • Security in the spotlight as GITEX AI ASIA opens in Singapore
  • Darktrace solution to deliver real‑time security coaching

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • Future Workplace
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl