Suspected Chinese State Hackers Attack Global Telecom Carriers: Cybereason

The team at Cybereason has concluded "with a high level of certainty that the threat actor is affiliated with China and is likely state sponsored".

Advertisement
By Indo-Asian News Service | Updated: 25 June 2019 15:51 IST

Suspected Chinese hackers have infiltrated into the networks of over a dozen telecommunication providers in Europe, Asia, Africa and the Middle East - gaining control and stealing hundreds of gigabytes of data of individuals, a US-based cyber-security firm has revealed.

Any entity that possesses the power to take over the networks of telecommunications providers can potentially leverage its unlawful access and control of the network to shut down or disrupt an entire cellular network as part of a larger cyber warfare operation, said Boston-based Cyberreason.

The team at Cybereason, as part of their Operation Soft Cell, has concluded "with a high level of certainty that the threat actor is affiliated with China and is likely state-sponsored".

Advertisement

"The tools and techniques used throughout these attacks are consistent with several Chinese threat actors, specifically with APT10, a threat actor believed to operate on behalf of the Chinese Ministry of State Security (MSS)," said the firm on Monday.

Advertisement

The hackers have obtained all data stored in the active directory, compromising every single username and password in the organization, along with other personally identifiable information, billing data, call detail records, credentials, email servers, geo-location of users and more.

"Last year, we identified a threat actor that has been operating in telecommunications provider environments for at least two years. We performed a post-incident review of the attacks and were able to identify changes in the attack patterns along with new activity every quarter," said Amit Serper, Cybereason's Head of security research.

Advertisement

"This type of targeted cyber espionage is usually the work of nation state threat actors," he added.

The attack began with a web shell running on a vulnerable, publicly-facing server, from which the attackers gathered information about the network and propagated across the network.

Advertisement

The threat actor attempted to compromise critical assets, such as database servers, billing servers, and the active directory. As malicious activity was detected and remediated against, the threat actor stopped the attack.

During the persistent attack, the attackers worked in waves - abandoning one thread of attack when it was detected and stopped, only to return months later with new tools and techniques.

In 2018, 30 percent of the telecommunications providers reported sensitive customer information was stolen due to an attack.

In the past 13 years, mobile cellular phone subscribers have quadrupled in size and sit at eight billion subscribers today.

Due to their wide availability and the fundamental service they bring, telecommunications providers have become critical infrastructure for the majority of world powers.

"Much like telecommunication providers, many other critical infrastructure organizations provide a valuable targets for nation state threat actors, due to their high impact," said the researchers.

The threat actor managed to infiltrate into the deepest segments of the providers' network, including some isolated from the internet, as well as compromise critical assets.

"Our investigation showed that these attacks were targeted, and that the threat actor sought to steal communications data of specific individuals in various countries," said Cybereason.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Cybereason, China
Advertisement
Popular Mobile Brands
  1. Amazon Sale 2025: OnePlus 13s, OnePlus Nord 5 Deals Revealed
  2. iPhone 16 Pro, iPhone 16 Pro Max Offers Listed Ahead of Flipkart Sale
  3. OnePlus 13 Gets Big Price Cut at Amazon Great Indian Festival Sale
  4. Vivo V60e Price in India, Specifications Surface Ahead of Launch
  5. Apple's OLED MacBook Pro Model Could Feature a Touchscreen, Analyst Says
  1. JWST Identifies Compact, Metal-Poor Star-Forming Region Tracing Back to Early Universe
  2. Researchers Develop Method to Predict Rare Green Auroral Events on Mars
  3. Kanyakumari Now Streaming on This OTT Platform: Know Everything About This Telugu Romance Drama
  4. Demon Slayer: Infinity Castle OTT Release: Know When and Where to Watch it Online?
  5. Xbox Game Pass Wave 2 Titles for September Include RoadCraft, Frostpunk 2 and Hades
  6. Government Makes Cybersecurity Audits Mandatory for Crypto Exchanges Due to Rising Risks
  7. Apple's OLED MacBook Pro Model Could Feature a Touchscreen, Analyst Says
  8. CMF Headphone Pro India Launch Date Set for September 29; Design Teased
  9. Nothing OS 4.0 Announced; Brings New AI Dashboard to Track AI Usage, Extra Dark Mode and More
  10. Meta Connect 2025 Tomorrow: How to Watch Livestream, Expected Announcements
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.