Suspected Chinese State Hackers Attack Global Telecom Carriers: Cybereason

The team at Cybereason has concluded "with a high level of certainty that the threat actor is affiliated with China and is likely state sponsored".

Advertisement
By Indo-Asian News Service | Updated: 25 June 2019 15:51 IST

Suspected Chinese hackers have infiltrated into the networks of over a dozen telecommunication providers in Europe, Asia, Africa and the Middle East - gaining control and stealing hundreds of gigabytes of data of individuals, a US-based cyber-security firm has revealed.

Any entity that possesses the power to take over the networks of telecommunications providers can potentially leverage its unlawful access and control of the network to shut down or disrupt an entire cellular network as part of a larger cyber warfare operation, said Boston-based Cyberreason.

The team at Cybereason, as part of their Operation Soft Cell, has concluded "with a high level of certainty that the threat actor is affiliated with China and is likely state-sponsored".

Advertisement

"The tools and techniques used throughout these attacks are consistent with several Chinese threat actors, specifically with APT10, a threat actor believed to operate on behalf of the Chinese Ministry of State Security (MSS)," said the firm on Monday.

Advertisement

The hackers have obtained all data stored in the active directory, compromising every single username and password in the organization, along with other personally identifiable information, billing data, call detail records, credentials, email servers, geo-location of users and more.

"Last year, we identified a threat actor that has been operating in telecommunications provider environments for at least two years. We performed a post-incident review of the attacks and were able to identify changes in the attack patterns along with new activity every quarter," said Amit Serper, Cybereason's Head of security research.

Advertisement

"This type of targeted cyber espionage is usually the work of nation state threat actors," he added.

The attack began with a web shell running on a vulnerable, publicly-facing server, from which the attackers gathered information about the network and propagated across the network.

Advertisement

The threat actor attempted to compromise critical assets, such as database servers, billing servers, and the active directory. As malicious activity was detected and remediated against, the threat actor stopped the attack.

During the persistent attack, the attackers worked in waves - abandoning one thread of attack when it was detected and stopped, only to return months later with new tools and techniques.

In 2018, 30 percent of the telecommunications providers reported sensitive customer information was stolen due to an attack.

In the past 13 years, mobile cellular phone subscribers have quadrupled in size and sit at eight billion subscribers today.

Due to their wide availability and the fundamental service they bring, telecommunications providers have become critical infrastructure for the majority of world powers.

"Much like telecommunication providers, many other critical infrastructure organizations provide a valuable targets for nation state threat actors, due to their high impact," said the researchers.

The threat actor managed to infiltrate into the deepest segments of the providers' network, including some isolated from the internet, as well as compromise critical assets.

"Our investigation showed that these attacks were targeted, and that the threat actor sought to steal communications data of specific individuals in various countries," said Cybereason.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Cybereason, China
Advertisement
Popular Mobile Brands
  1. Samsung Galaxy S26+ Reportedly Listed for Sale Online Ahead of Launch
  2. Apple to Reportedly Launch Low-Cost MacBook in 'Playful Colors' in March
  3. iPhone 18 Series May Arrive Without a Physical SIM Slot in This Region
  4. Poco X8 Pro Spotted on Geekbench With This Dimensity 8000 Series Chipset
  5. Vivo X300 FE Reportedly Bags IMDA and TUV Certifications Ahead of Launch
  6. Xiaomi 17 Series Leak Hints at Imminent Launch Ahead of MWC at These Prices
  7. AI Impact Summit: From Registration to Schedule, All You Need to Know
  8. Tecno Spark 50 4G Launch Timeline, Design, Colourways, Key Features Leaked
  9. Oppo Find X10 Series Could Debut This Year With This iPhone-Like Feature
  1. Sony Could Reportedly Delay PS6 to as Late as 2029 Due to RAM Shortage
  2. iPhone 18 Series to Drop SIM Card Slot in Europe to Make Room for Slightly Larger Battery: Report
  3. Poco X8 Pro Spotted on Geekbench With MediaTek Dimensity 8500 Ultra SoC, Android 16
  4. Xiaomi 17, Xiaomi 17 Ultra Global Price Details, Launch Date and Colour Options Leaked
  5. X Building Smart 'Cashtags' to Let Users Check Cryptocurrency Prices in Real-Time
  6. Samsung Galaxy A27 5G Listing on IMEI Database Suggests a Galaxy A26 Successor Is on the Way
  7. Anthropic Inaugurates First Indian Office in Bengaluru, Starts Hiring Local Talent
  8. Apple Tipped to Adopt Samsung's Privacy Display Technology for MacBook Models by 2029
  9. Oppo Find X10 Series Tipped to Launch in H2 2026 With Built-In Magnets for Wireless Charging
  10. AMD and TCS to Co-Develop Helios AI Data Centre Architecture, Deliver 200MW Data Centre Blueprint
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.