{"id":182,"date":"2024-02-29T16:02:26","date_gmt":"2024-02-29T16:02:26","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/02\/29\/gtpdoor-linux-malware-targets-telecoms-exploiting-gprs-roaming-networks\/"},"modified":"2024-02-29T16:02:26","modified_gmt":"2024-02-29T16:02:26","slug":"gtpdoor-linux-malware-targets-telecoms-exploiting-gprs-roaming-networks","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/02\/29\/gtpdoor-linux-malware-targets-telecoms-exploiting-gprs-roaming-networks\/","title":{"rendered":"GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks"},"content":{"rendered":"<p>\u200bThreat hunters have discovered a new Linux malware called\u00a0GTPDOOR\u00a0that\u2019s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX)<br \/>\nThe\u00a0malware\u00a0is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications.<br \/>\nGPRS roaming allows subscribers to access their GPRS services while they are\u00a0Threat hunters have discovered a new Linux malware called\u00a0GTPDOOR\u00a0that\u2019s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX)<br \/>\nThe\u00a0malware\u00a0is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications.<br \/>\nGPRS roaming allows subscribers to access their GPRS services while they are\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThreat hunters have discovered a new Linux malware called\u00a0GTPDOOR\u00a0that\u2019s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX) The\u00a0malware\u00a0is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications. GPRS roaming allows subscribers to access their GPRS services while they are\u00a0Threat hunters have&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/02\/29\/gtpdoor-linux-malware-targets-telecoms-exploiting-gprs-roaming-networks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/182"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/183"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}