The Covert Operator's Playbook Infiltration of Global Teleco... #1211
+223
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Technical Summary: CL-STA-0969 APT Cluster
Between February and November 2024, Unit 42 tracked CL-STA-0969, a nation-state-linked APT cluster targeting Southwest Asia telecom roaming networks. Initial access was achieved via SSH brute-force against vendor default accounts using a custom dictionary of built-in telecom credentials. Once inside, the actors implanted multiple covert backdoors and scanners to enumerate, tunnel, and control subscriber sessions stealthily. ...
🔧 Technical Details
AuthDoor PAM Backdoor: Overwrites the
pam_unix.so
library to hookpam_sm_authenticate
, capturing and ASCII-hex encoding credentials into/usr/bin/.dbus.log
, while accepting a hard-coded magic password for persistent SSH access. It uses atomic temp-file renames to avoid partial writes and allow stealthy updates. 🎁 PoCCordscan Telecom Scanner: A custom Go utility that sends GTP-C context-request packets over UDP 212...
🤖 Agent Actions
Added content from the Unit42 telecom-network intrusion report to HackTricks:
Created new file
src/generic-methodologies-and-resources/pentesting-network/telecom-network-exploitation.md
• In-depth GTP/roaming attack methodology (Cordscan, GTPDoor, SGSN-emu pivot, covert channels, defence evasion, detection ideas, toolbox)
• Proper HackTricks banners and references section.
Linked the new page from pentesting-network/README.md under a fresh “Telecom / Mobile-Core (GTP) Exploitation” subsection.
Enhanced linux-post-exploitation PAM page:
• Added practical “Backdooring PAM – Hooking pam_unix.so” section (source code, compilation, OPSEC, detection).
• Appended the Unit42 blog URL to references.
These additions integrate the new telecom-specific techniques ...
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.