Palo Alto Networks reported that a nation-state actor, tracked as CL-STA-0969, targeted telecom firms in Southeast Asia, with attacks on critical infrastructure from February to November 2024.
Threat actor CL-STA-0969 overlaps with the China-linked cyber espionage group Liminal Panda. The threat actor also showed overlap with groups like Light Basin, UNC3886, UNC2891, and UNC1945, using a mix of custom and public tools such as Microsocks, FRP, FScan, and Responder, as well as exploits for known vulnerabilities like CVE-2016-5195, CVE-2021-4034, and CVE-2021-3156. The group maintained strong OPSEC, staying undetected through DNS tunneling, routing via compromised mobile networks, log clearing, and disguising process names.
The researchers haven’t found evidence of data exfiltration, they used tools like Cordscan in an attempt to collect mobile device location data. The group sets up resilient remote access, likely for future espionage operations.
Between February and November 2024, the APT group targeted critical telecommunications infrastructure, likely gaining access through brute-force attacks on authentication systems. Using custom tools like AuthDoor, GTPDoor, ChronosRAT, and NoDepDNS, they exploited telecom protocols such as SSH, ICMP, DNS, and GTP for covert access and command-and-control. To maintain stealth, they used PAM backdoors, disguised processes, tampered with logs, and disabled SELinux, demonstrating deep knowledge of telecom environments and strong operational security.
“Despite their high level of OPSEC, substantial evidence points to attackers gaining initial access via SSH brute force. To do this, they used a well-tuned account dictionary list that included built-in accounts specific to telecommunications equipment.” reads the report published by Palo Alto Networks.
Below is the list of tools used by threat actor CL-STA-0969:
.pcap
file.“CL-STA-0969 demonstrates a deep understanding of telecommunications protocols and infrastructure. Its malware, tools and techniques reveal a calculated effort to maintain persistent, stealthy access. It achieved this by proxying traffic through other telecom nodes, tunneling data using less-scrutinized protocols and employing various defense evasion techniques. Organizations relying on legacy hosts and services within the targeted infrastructure increases vulnerability to such attacks.” conludes the report.
“CL-STA-0969’s multi-pronged operational strategy, combining technical expertise with environmental adaptation, underscores the need for vigilant security measures and proactive threat intelligence.”
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, CL-STA-0969)