Chinese APT Calypso Deploys Showboat and JFMBackdoor Against Telecoms
China-linked Calypso group targets telecoms across Middle East and Asia Pacific with new Linux and Windows malware. Showboat provides SOCKS5 proxy access; JFMBackdoor enables full system control.
Security researchers have identified a Chinese cyber-espionage campaign targeting telecommunications providers across the Middle East and Asia Pacific using two previously undocumented malware families. The operation, attributed to the Calypso APT group (also tracked as Red Lamassu), has been active since at least mid-2022 and employs distinct tooling for Linux and Windows environments.
The Linux implant, dubbed Showboat, functions as a modular post-exploitation framework with SOCKS5 proxy capabilities. Its Windows counterpart, JFMBackdoor, provides full remote access through DLL sideloading. Together, they give attackers persistent access to telecom infrastructure while maintaining the ability to pivot through compromised networks.
Showboat: Linux Persistence at Scale
According to analysis from PwC's threat intelligence team, Showboat is designed specifically for Linux servers—the backbone of most telecom operations. The malware establishes persistence through service installation and supports:
- Remote shell access — Interactive command execution on compromised hosts
- File transfer — Upload and download capabilities for data exfiltration and tool staging
- SOCKS5 proxy — Network proxying that allows attackers to route traffic through compromised infrastructure
- Process hiding — A "hide" command that conceals the malware's process from system utilities
The process hiding capability is particularly sophisticated. Showboat retrieves obfuscation code from external websites including Pastebin and online forums, making detection more difficult and allowing operators to update evasion techniques without touching the deployed malware.
The Hacker News reports that Showboat's modular architecture allows operators to load additional capabilities as needed, adapting to specific target environments.
JFMBackdoor: Windows Access
The Windows component arrives through DLL sideloading, exploiting a legitimate executable to load the malicious payload. Once active, JFMBackdoor provides:
- Full remote shell capabilities
- File system operations
- Network proxying for lateral movement
- Screenshot capture
- Self-removal to evade forensic analysis
The dual-platform approach makes sense for telecom targeting. While core network infrastructure typically runs Linux, administrative systems, databases, and corporate networks often mix Windows environments. Having purpose-built tools for both operating systems lets Calypso move laterally regardless of what they encounter.
Attribution and Geographic Focus
Researchers have linked the campaign to China through multiple indicators. BleepingComputer notes that command-and-control infrastructure traces back to IP addresses geolocated to Chengdu, the capital of Sichuan province—a known hub for Chinese state-affiliated cyber operations.
Confirmed victims include an ISP in Afghanistan and an entity in Azerbaijan. Researchers also identified potential compromises in the United States and Ukraine, though details on those intrusions remain limited.
The geographic spread aligns with broader Chinese strategic interests. Telecom providers offer attractive targets: access to communications metadata, potential for surveillance, and opportunities to intercept or manipulate traffic crossing their networks.
A Crowded Field
Calypso is one of several China-linked groups targeting telecommunications infrastructure. The Salt Typhoon campaign compromised at least eight U.S. telecom providers including Verizon, AT&T, and Lumen Technologies, exposing metadata on over a million people. Last year, we covered the Webworm APT's deployment of EchoCreep and GraphWorm malware against European targets, using Discord and Microsoft Graph for command-and-control.
Chinese APT groups have systematically targeted the telecommunications sector globally, often sharing tools and techniques. PwC's analysis suggests Showboat and JFMBackdoor may have been employed by more than one threat activity cluster, indicating possible tool sharing among affiliated groups.
Defending Telecom Infrastructure
Organizations in the telecommunications sector should assume they are targets and implement detection for:
Network indicators:
- Unexpected outbound SOCKS5 connections from Linux servers
- Traffic to Pastebin or similar paste sites from production systems
- DLL sideloading attempts on Windows systems
Host indicators:
- New or modified systemd services on Linux hosts
- Processes with hidden identities using kernel techniques
- Suspicious DLL loading patterns on Windows
The telecom sector's critical role in national infrastructure makes these intrusions a national security concern. Organizations should coordinate with relevant government agencies—in the U.S., that means CISA and the FBI—when detecting indicators associated with nation-state operations.
For organizations seeking deeper context on Chinese cyber operations targeting critical infrastructure, our cybersecurity books resource page includes recommended reading on state-sponsored campaigns.
Related Articles
Salt Typhoon Affiliate Hits Telecoms in 30+ Countries With TernDoor
China-linked UAT-9244 deploys TernDoor backdoor and peer-to-peer implants against telecom infrastructure across South America, North America, and Europe.
Mar 13, 2026Silk Typhoon Hacker Extradited to U.S. for COVID Vaccine Theft
Chinese national Xu Zewei faces nine federal counts after extradition from Italy for alleged role in Silk Typhoon attacks stealing COVID-19 vaccine research from U.S. universities and research institutions.
Apr 28, 2026Phantom Taurus Deploys Net-Star Backdoors Across Africa
Unit 42 exposes Phantom Taurus, a Chinese APT targeting embassies and foreign ministries with fileless NET-STAR malware. The group resurfaces within hours after discovery.
Apr 4, 2026Salt Typhoon Breaches Congressional Committee Staff Emails
Chinese state hackers accessed email accounts of House staffers working on China, foreign affairs, and defense. The intrusion was discovered in December.
Jan 12, 2026