03/26/2026 | Press release | Distributed by Public on 03/26/2026 06:42
Boston, MA - March 26, 2026 - Rapid7 (NASDAQ: RPD), a global leader in AI-powered managed cybersecurity operations, released findings from a months-long research investigation from Rapid7 Labs, "Sleeper Cells in the Telecom Backbone," detailing a sustained espionage campaign conducted by a China-nexus threat actor, Red Menshen, with covert access inside global telecommunications infrastructure.
The research highlights a shift from opportunistic intrusion to deliberate, long-term pre-positioning inside telecommunications networks. These "sleeper cells" are designed to remain undetected while providing persistent visibility into subscriber activity, signaling systems, and sensitive communications-enabling ongoing intelligence collection across environments that support government, commercial, and critical infrastructure operations.
"If you have access to telecommunications infrastructure, you are not just inside one company, you are operating close to the communication layer of entire populations, which makes this type of access highly valuable and elevates detection to a national-level concern," said Raj Samani, chief scientist at Rapid7. "The activity we are seeing continues to evolve in ways that improve stealth and persistence, and organizations should treat detection as the start of investigation, not the end of it."
The research also identifies critical visibility gaps into persistence at the kernel and packet-filtering layers. Without insight into these areas, service masquerading and stealth activation techniques can remain undetected for extended periods. Organizations must have preemptive detection strategies that identify unusual service masquerading and stealth activation mechanisms before they can be leveraged for high-level intelligence collection.
Key findings:
"This is not traditional espionage, it is pre-positioning inside the infrastructure that nations depend on," said Christiaan Beek, vice president of cyber intelligence at Rapid7. "We are seeing a persistent access model where attackers embed within core communications systems and maintain that access over extended periods."
Rapid7 is working with organizations it believes may be impacted and, to support defenders in identifying potential BPFdoor activity, has released a free, open-source scanning script. The scanning script is designed to detect both previously documented BPFDoor variants and newer samples, and is available to assist organizations in proactively identifying potential compromises. Rapid7's goal is to help defenders rapidly validate exposure and begin incident response investigations where necessary. In addition, Rapid7 has incorporated these findings across its detection capabilities, including retroactive threat hunting and updated intelligence available to customers through the Rapid7 Intelligence Hub.
On Thursday, March 26 at 12:20 p.m. PT at RSAC 2026 Conference in San Francisco, Christiaan Beek will be presenting the full scope of this research in his session, "Sleeper Cells in the Telecom Backbone."
On Monday, March 30, Raj Samani and Christiaan Beek will discuss the findings and the impact on global telecommunications in this exclusive webinar.