Back to all articles

Analyzing the Shift Toward Evasive Targeting in Core Infrastructure and Mobile Environments

Recent data indicates that high-tier vulnerability frameworks are increasingly being adopted by broader threat groups to target telecommunications and OT environments. This report details the shift toward kernel-level evasion and provides proactive remediation strategies for network monitoring and post-quantum cryptographic agility.

Triage Security Media Team
4 min read

Over the last 24 hours, the threat situation has shifted toward more sophisticated and stealthy targeting of core infrastructure, ranging from the deep kernels of telecommunications backbones to the mobile devices and industrial systems that support global operations. Today’s developments indicate a concerning trend: high-tier, state-aligned methodologies are increasingly transitioning to opportunistic and financially motivated groups, making enterprise-grade security a moving target. For defensive teams, the perimeter extends well beyond the firewall; it now includes the kernel, the mobile keychain, and the encrypted packet itself.

One significant evolution in evasion comes from the threat group Red Menshen, also known as Earth Bluecrow. Researchers today revealed that the group has refined its BPFdoor Linux kernel module to better evade detection within telecommunications and critical infrastructure networks. Unlike traditional unauthorized software that creates high-volume network noise, BPFdoor operates passively within the Linux kernel, using the Berkeley Packet Filter (BPF) to watch for specific activation criteria. Recent reports show the group has moved away including broad packet monitoring and strictly hiding its triggers within standard HTTPS and ICMP traffic. By specifically monitoring the 26th byte offset of incoming TLS-encrypted requests, the unauthorized module remains dormant until it identifies a specific value, making it highly evasive to standard traffic inspection tools that categorize the data as benign.

This trend toward high-end evasion is mirrored in the mobile space. Sophisticated iOS vulnerability frameworks like Coruna and DarkSword have moved from the exclusive domain of state-level espionage to broader threat groups. Coruna, which is technically linked to the 2023 "Operation Triangulation" campaign, and DarkSword, whose components were recently published on GitHub, are now utilized by financially motivated groups and Russian-aligned actors like UNC6353. These frameworks are being modified with modules for cryptocurrency theft and credential harvesting. This proliferation means advanced capabilities once reserved for high-value diplomatic targets are now deployed in watering hole campaigns against retail and industrial vendors, lowering the barrier to entry for compromising the modern mobile workforce.

While software-based risks evolve, the physical domain remains under constant pressure. In the Middle East, internet-connected cameras have become strategic intelligence assets. Recent reporting shows a definitive shift in how unauthorized access to IP cameras is leveraged—moving away from botnet recruitment toward operational visibility and reconnaissance. In recent geopolitical events, access to traffic camera networks provided critical intelligence prior to kinetic operations. Following these events, scanning activity against camera networks in Israel and surrounding Gulf nations has spiked. For organizations in sensitive regions, an unpatched or exposed camera is a potential reconnaissance point that requires immediate remediation.

In the industrial sector, the overall volume of physically impactful operational technology (OT) security incidents saw a notable 25% decline in 2025. This marks the first reduction in seven years, likely driven by a temporary stabilization in the ransomware ecosystem and increased law enforcement pressure on major groups. However, defenders should remain vigilant. While physically disruptive events dropped to 57 recorded incidents, the targeting of critical infrastructure without immediate physical disruption doubled over the same period. High-profile cases, such as the security incident at Jaguar Land Rover that resulted in billions of dollars in economic impact, show that even a year with lower overall volume can still produce severe financial and operational consequences.

For security teams tasked with defending these environments, priorities should expand to include proactive, kernel-level telemetry and cryptographic resilience. Detecting BPFdoor requires monitoring for unauthorized BPF filters attached to network interfaces and restricting unnecessary ICMP communication between internal servers. Red Menshen frequently leverages the ICMP value 0xFFFFFFFF to route commands between affected machines; we recommend integrating this pattern into internal traffic monitoring. On the mobile front, frameworks like Coruna can extract entire keychains and credentials in minutes. Relying solely on the native security of mobile operating systems is insufficient. Organizations need visibility platforms capable of detecting the anomalous behavior of these complex vulnerability frameworks before lateral movement begins.

As we build longer-term resilience, Google’s commitment today to a 2029 post-quantum cryptography (PQC) timeline provides a clear roadmap for the industry. Protecting authentication services and digital signatures is a critical defensive pivot. While the risk of "store-now-decrypt-later" exists for encrypted data, the risk to digital signatures requires transition before a cryptographically relevant quantum computer is realized. Security teams can begin this path today by conducting cryptographic inventories and ensuring that new deployments prioritize crypto agility, allowing for the seamless swapping of algorithms as NIST standards are finalized.

The convergence of state-level tools with malicious intent suggests a future where high-complexity methodologies are standard practice. Threat actors are tailoring BPFdoor to mimic legitimate HPE ProLiant and Kubernetes services, showing an intimate understanding of modern data center architecture. Defenders can match this knowledge by working closely with infrastructure teams to ensure kernel-level telemetry is captured and analyzed.

Gaps remain in our understanding of how these high-end tools are traded on the secondary market—specifically whether brokers or the actors themselves are adding new financial theft modules to kits like Coruna. Additionally, while the decline in OT incidents is a positive metric, a lack of transparency in reporting and potential legal liabilities suggest the true number of physical disruptions may be higher than public data indicates.