How Is UAT-9244 Weaponizing South American Telecoms?

The systemic compromise of telecommunications infrastructure in South America has reached a critical inflection point, revealing a sophisticated strategy of long-term digital occupation. Throughout the current operational cycle leading into late 2026, security researchers have tracked the persistent movements of a threat actor designated as UAT-9244, a group linked with high confidence to the established Chinese-aligned collective known as Famous Sparrow. This adversary has moved beyond simple data exfiltration, focusing instead on the complete subversion of critical network nodes across multiple nations. By infiltrating a diverse array of Windows systems, Linux endpoints, and network edge devices, the group has successfully established a multi-layered presence that serves as a foundation for sustained intelligence gathering. The breadth of this campaign suggests a highly organized effort to maintain visibility into regional communications, ensuring that the adversary remains embedded within the very fabric of the continent’s digital connectivity for the foreseeable future.

Evolution of Stealth Through Custom Malware Architecture

The technical execution of these intrusions relies heavily on a specialized malware trio consisting of TernDoor, PeerTime, and BruteEntry, each serving a distinct role in maintaining the group’s clandestine access. TernDoor, which functions as a sophisticated variant of the older CrowDoor codebase, represents a significant advancement in detection evasion by utilizing DLL side-loading techniques to trick legitimate system processes into executing malicious code. This backdoor is further bolstered by a custom Windows driver capable of terminating or suspending security-related processes, effectively blinding local defensive software before it can trigger an alert. Such a capability allows the attackers to operate with relative impunity on high-value workstations and servers, ensuring that their presence remains undetected even during routine system audits or automated scans. By focusing on the manipulation of the operating system’s kernel-level functions, UAT-9244 has demonstrated a level of technical proficiency that places them among the most capable actors currently operating in the South American theater.

While TernDoor secures the Windows environment, the PeerTime backdoor provides the group with a resilient foothold within Linux systems and embedded hardware commonly found in telecom data centers. The most striking feature of PeerTime is its reliance on the BitTorrent protocol for peer-to-peer command-and-control communications, a design choice that significantly complicates efforts to disrupt the attackers’ infrastructure. By masquerading as legitimate peer-to-peer traffic, these communications blend into the massive volume of data typical of telecommunications networks, making it nearly impossible for traditional firewalls to isolate malicious packets. This decentralized approach to command-and-control ensures that even if several relay nodes are identified and neutralized, the broader network of compromised devices can continue to function and receive instructions. This dual-track strategy of targeting both primary workstations and specialized backend hardware ensures that UAT-9244 maintains a redundant and highly flexible presence that can survive even the most aggressive remediation efforts by internal security teams.

Infrastructure Transformation and the Rise of Operational Relay Boxes

A particularly alarming trend identified during the ongoing analysis of these campaigns is the systematic conversion of compromised telecommunications hardware into what are known as operational relay boxes. Through the deployment of the Go-based BruteEntry tool, the threat actors effectively hijack the victim’s own high-performance infrastructure to serve as a launchpad for secondary attacks against external targets. This tactic allows UAT-9244 to conduct mass-scanning operations and brute-force attempts against services like SSH, Postgres, and Tomcat while appearing to originate from a legitimate, trusted telecommunications provider. By utilizing these proxy nodes, the adversary successfully masks their true geographic origin and bypasses many of the reputation-based filtering systems that modern enterprises rely on for defense. This weaponization of local infrastructure turns the victimized telecom provider into an unwitting accomplice, facilitating broader malicious activity that extends far beyond the initial point of compromise and complicates the geopolitical implications of the breach.

The synthesis of these findings pointed toward a highly disciplined adversary whose tactical overlaps with groups like Tropic Trooper and the presence of Simplified Chinese debug strings solidified their attribution to East Asian interests. In response to these persistent threats, the telecommunications industry began shifting toward a more aggressive stance on edge device security and the implementation of strict micro-segmentation for management interfaces. Network administrators prioritized the auditing of all external-facing hardware, particularly those running proprietary or legacy firmware that lacked modern telemetry capabilities. Security teams also moved to implement Zero Trust architectures that treated all internal traffic with the same level of scrutiny as external requests, significantly limiting the lateral movement capabilities of the TernDoor and PeerTime backdoors. By adopting a posture of continuous verification and focusing on the telemetry of encrypted traffic, regional operators sought to regain control over their environments and diminish the long-term utility of the operational relay boxes established by the attackers.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later