News

Google Chrome to distrust Chunghwa Telecom, Netlock certificates in August

Telcos
2025-06-02 https://www.bleepingcomputer.com/news/security/google-chrome-to-distrust-chunghwa-telecom-netlock-certificates-in-august/
Google says it will no longer trust root CA certificates signed by Chunghwa Telecom and Netlock in the Chrome Root Store due to a pattern of compliance failures and failure to make improvements. [...] "

Autosummary: Netlock is a significant Hungarian provider of digital certification services (electronic signatures, timestamping, and TLS/SSL certificates), best known for its Arany (Gold Class) Root CA, which is widely used in Hungary and other European countries. "


Adidas warns of data breach after customer service provider hack

financial Telcos
2025-05-27 https://www.bleepingcomputer.com/news/security/adidas-warns-of-data-breach-after-customer-service-provider-hack/
German sportswear giant Adidas disclosed a data breach after attackers hacked a customer service provider and stole some customers" data. [...] "

Autosummary: "


SK Telecom revealed that malware breach began in 2022

exploits Telcos
2025-05-21 https://securityaffairs.com/178120/data-breach/sk-telecom-revealed-that-malware-breach-began-in-2022.html
South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April began in 2022. SK Telecom is South Korea’s largest wireless telecom company, a major player in the country’s mobile and tech landscape. It holds about 48% of the market share for mobile services, meaning around 34 million subscribers use its […] "

Autosummary: “The personal information that has been confirmed to have been leaked so far is a total of 25 types, including users’ mobile phone numbers, IMSI (subscriber identification number), SIM authentication keys, and other SIM-related information that were stored in HSS*.”The company offers cellular service, along with 5G development, AI services, IoT solutions, cloud computing, and smart city infrastructure. "


SK Telecom says malware breach lasted 3 years, impacted 27 million numbers

exploits Telcos
2025-05-20 https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/
SK Telecom says that a recently disclosed cybersecurity incident in April, first occurred all the way back in 2022, ultimately exposing the USIM data of 27 million subscribers. [...] "

Autosummary: This breach allowed attackers to steal data that included IMSI, USIM authentication keys, network usage data, and SMS/contacts stored in the SIM. "


Mobile carrier Cellcom confirms cyberattack behind extended outages

ciber Telcos
2025-05-20 https://www.bleepingcomputer.com/news/security/mobile-carrier-cellcom-confirms-cyberattack-behind-extended-outages/
Wisconsin wireless provider Cellcom has confirmed that a cyberattack is responsible for the widespread service outage and disruptions that began on the evening of May 14, 2025. [...] "

Autosummary: " Cellcom initially claimed the disruption was caused by a technical issue, stating that data services, iMessage, RCS messaging, and 911 emergency services remained operational. "


SK Telecom cyberattack: Free SIM replacements for 25 million customers

ciber Telcos
2025-04-29 https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/
South Korean mobile provider SK Telecom has announced free SIM card replacements to its 25 million mobile customers following a recent USIM data breach, but only 6 million cards are available through May. [...] "

Autosummary: "


Earth Kurma APT is actively targeting government and telecommunications orgs in Southeast Asia

government Telcos
2025-04-28 https://securityaffairs.com/177125/apt/earth-kurma-apt-is-actively-targeting-government-and-telecommunications-orgs-in-southeast-asia.html
Earth Kurma APT carried out a sophisticated campaign against government and telecommunications sectors in Southeast Asia. Trend Research exposed the Earth Kurma APT campaign targeting Southeast Asia’s government and telecom sectors. Threat actors use custom malware, rootkits, and cloud storage for espionage, credential theft, and data exfiltration, posing a high business risk with advanced evasion […] "

Autosummary: Below is the infection chain and malware used by the group: Earth Kurma used tools like NBTSCAN, Ladon, FRPC, WMIHACKER, and ICMPinger for lateral movement, network scanning, and malware deployment.Threat actors use custom malware, rootkits, and cloud storage for espionage, credential theft, and data exfiltration, posing a high business risk with advanced evasion techniques. "


African multinational telco giant MTN Group disclosed a data breach

financial Telcos
2025-04-26 https://securityaffairs.com/177037/security/african-multinational-telco-giant-mtn-disclosed-a-data-breach.html
African multinational telecommunications company MTN Group disclosed a data breach that exposed subscribers’ personal information. MTN Group Limited is a South African multinational telecommunications company headquartered in Johannesburg. Founded in 1994, it has grown to become Africa’s largest mobile network operator, serving over 290 million subscribers across 18 countries in Africa and the Middle East. […] "

Autosummary: Compromised data includes full names, contact details, ID numbers, banking information, driver’s license numbers, medical records and passport details. "


FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches

Telcos
2025-04-25 https://www.bleepingcomputer.com/news/security/fbi-seeks-help-to-unmask-salt-typhoon-hackers-behind-telecom-breaches/
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide. [...] "

Autosummary: In October, the FBI and CISA confirmed that the Chinese state hackers had breached multiple telecom providers (including AT&T, Verizon, Lumen, Charter Communications, Consolidated Communications, and Windstream) and many other telecom companies in dozens of countries. "


Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Telcos
2025-04-25 https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-access-sensitive-sim-card-data-at-south-koreas-largest-telecoms-company
Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this month that saw malware infiltrate its internal systems, and access data related to customers" SIM cards. Read more in my article on the Hot for Security blog. "

Autosummary: Although no customer names, birth dates, or financial details were leaked, the information identifying SIM cards is considered highly sensitive - as it could permit a determined criminal to hijack victims" phone numbers in a "SIM Swap" attack. "


SK Telecom warns customer USIM data exposed in malware attack

exploits Telcos
2025-04-22 https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/
South Korea"s largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers. [...] "

Autosummary: "


Millions of SK Telecom customers are potentially at risk following USIM data compromise

Telcos
2025-04-22 https://securityaffairs.com/176802/data-breach/sk-telecom-data-breach.html
SK Telecom warned that threat actors accessed customer Universal Subscriber Identity Module (USIM) info through a malware attack. SK Telecom is South Korea’s largest wireless telecom company, a major player in the country’s mobile and tech landscape. It holds about 48% of the market share for mobile services, meaning around 34 million subscribers use its […] "

Autosummary: The company offers cellular service, along with 5G development, AI services, IoT solutions, cloud computing, and smart city infrastructure. "


South African telecom provider Cell C disclosed a data breach following a cyberattack

financial ciber Telcos
2025-04-14 https://securityaffairs.com/176509/data-breach/south-african-telecom-provider-cell-c-disclosed-a-data-breach.html
Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, ,after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and […] "

Autosummary: Compromised data includes full names, contact details, ID numbers, banking information, driver’s license numbers, medical records and passport details.South African telecom provider Cell C disclosed a data breach following a cyberattack Pierluigi Paganini April 14, 2025 April 14, 2025 Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. "


Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers

Telcos
2025-04-02 https://thehackernews.com/2025/04/helping-your-clients-achieve-nist.html
Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The National Institute of Standards and Technology (NIST) offers a comprehensive set of frameworks that provide a clear path to achieving robust cybersecurity practices. For service providers, adhering to NIST "

Autosummary: Key NIST Frameworks for Compliance NIST offers multiple cybersecurity frameworks, but the most relevant for service providers include: NIST Cybersecurity Framework (CSF 2.0) : A flexible, risk-based framework designed for businesses of all sizes and industries. For service providers, achieving NIST compliance means: Enhanced security: Improved ability to identify, assess, and mitigate cybersecurity risks. Step-by-Step Guide to Achieving NIST Compliance As mentioned above, achieving NIST compliance for clients presents numerous challenges for service providers, making the process complex and daunting. Limited budgets are a frequent obstacle for many organizations, making it essential to focus on high-impact controls, leverage open-source tools, and automate compliance tasks to manage costs effectively. "


Arkana Security group claims the hack of US telco provider WideOpenWest (WOW!)

Telcos
2025-03-27 https://securityaffairs.com/175905/data-breach/arkana-security-group-claims-the-hack-of-wideopenwest-wow.html
Arkana Security, a new ransomware group, claims to have breached the telecommunications provider WideOpenWest (WOW!). The new ransomware group Arkana Security claims to have hacked US telecom provider WOW!, stealing customer data. WideOpenWest (WOW!) is a US-based telecommunications company that provides broadband internet, cable TV, and phone services. It operates mainly in the Midwest and […] "

Autosummary: Pierluigi Paganini March 27, 2025 March 27, 2025 Arkana Security, a new ransomware group, claims to have breached the telecommunications provider WideOpenWest (WOW!). Arkana claimed to have breached WOW!’s internal systems, including AppianCloud and Symphonica platforms “A major cyber attack reaps Wide Open West (WOW!), a leading Internet Service Provider with over 1.5 million customers. "


Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years

Telcos
2025-03-25 https://thehackernews.com/2025/03/chinese-hackers-breach-asian-telecom.html
A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not "

Autosummary: " Coinciding with the MSS statement, Chinese cybersecurity firms QiAnXin and Antiy have detailed spear-phishing attacks orchestrated by a Taiwanese threat actor codenamed APT-Q-20 (aka APT-C-01, GreenSpot, Poison Cloud Vine, and White Dolphin) that lead to the delivery of a C++ trojan and command-and-control (C2) frameworks like Cobalt Strike and Sliver. "


Chinese Weaver Ant hackers spied on telco network for 4 years

Telcos
2025-03-24 https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.  [...] "

Autosummary: As the operation matured, Weaver Ant introduced a more advanced, custom-build web shell known as INMemory, which leverages a DLL (eval.dll) for stealthy ‘just-in-time code execution.’ "


Chinese APT Weaver Ant infiltrated a telco in Asia for over four years

Telcos
2025-03-24 https://securityaffairs.com/175800/apt/chinese-apt-weaver-ant-infiltrated-a-telco-for-over-four-years.html
China-linked APT Weaver Ant infiltrated the network of a telecommunications services provider for over four years.  The China-linked threat actor Weaver Ant infiltrated the network of a telecom provider in Asia for over four years. During a forensic investigation, Sygnia researchers observed multiple alerts that revealed a re-enabled threat actor account by a service account […] "

Autosummary: The China Chopper web shell, originally developed by Chinese threat actors, enables remote access and control over compromised web servers, facilitating persistent access, command execution, and data exfiltration.These commands included: ‘Get-DomainUserEvent’, ‘Get-DomainSubnet’, ‘Get-DomainUser’, ‘Get-NetSession’ etc.” "


Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

ransomware Telcos
2025-03-20 https://thehackernews.com/2025/03/why-continuous-compliance-monitoring-is.html
Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection and security regulations, such as HIPAA, PCI-DSS, CMMC, GDPR, and the FTC Safeguards Rule. However, many SMBs struggle to maintain compliance due to limited IT resources, evolving regulatory requirements, and complex security challenges "

Autosummary: By offering proactive compliance monitoring with Compliance Manager GRC, you can: ✅ Help clients avoid fines and security risks ✅ Automate compliance reporting and streamline audits ✅ Expand their service offerings and increase revenue ✅ Build long-term relationships with businesses in need of compliance expertise With compliance regulations only getting stricter, MSPs that invest in continuous compliance solutions today will be well-positioned for long-term success. New Features That Make Compliance Manager GRC Even More Powerful Compliance Monitor: Continuous Compliance Monitoring Compliance Monitor enables automated, ongoing compliance monitoring, ensuring MSPs and their clients stay compliant with minimal manual effort. How MSPs Can Implement Continuous Compliance Monitoring To successfully offer compliance monitoring, you should: Leverage Automated Compliance Tools – Use platforms like Compliance Manager GRC that provide real-time compliance assessments and reporting. Together, Compliance Monitor and Risk Manager make Compliance Manager GRC a no-brainer for MSPs looking to save time, reduce risk, and turn compliance into a high-value service.— Javier Dugarte, VP of Sales and Operations, GoCloud Inc. With Compliance Manager GRC, MSPs can turn compliance into a competitive advantage, securing high-value clients and unlocking new revenue streams. "


Denmark warns of increased state-sponsored campaigns targeting the European telcos

government Telcos
2025-03-16 https://securityaffairs.com/175479/intelligence/denmark-warns-of-increased-state-sponsored-campaigns-targeting-the-european-telcos.html
Denmark ‘s cybersecurity agency warns of increased state-sponsored campaigns targeting the European telecom companies Denmark raised the cyber espionage threat level for its telecom sector from medium to high due to rising threats across Europe. The Danish Social Security Agency published a new threat assessment for the cyber threat to the telecommunications sector that highlights […] "

Autosummary: Denmark warns of increased state-sponsored campaigns targeting the European telcos Pierluigi Paganini March 16, 2025 March 16, 2025 Denmark ‘s cybersecurity agency warns of increased state-sponsored campaigns targeting the European telecom companies Denmark raised the cyber espionage threat level for its telecom sector from medium to high due to rising threats across Europe. The Danish telecom sector faces multiple cyber threats: espionage, destructive attacks (MEDIUM), cyber activism (HIGH), and criminal hackers (VERY HIGH), including ransomware. In February, 2025, Cisco Talos researchers reported that China-linked APT group Salt Typhoon uses a custom-built utility, dubbed JumbledPath, to spy on network traffic of U.S. telecommunication providers. "


Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies

financial Telcos
2025-03-08 https://securityaffairs.com/175090/data-breach/japanese-telecom-giant-ntt-data-breach.html
A data breach suffered by the Japanese telecom giant NTT exposed information of nearly 18,000 corporate customers. Japanese telecom giant NTT suffered a data breach that exposed information of nearly 18,000 corporate customers. On February 5th, the security team detected suspicious activity in its ‘Order Information Distribution System,’ and immediately restricted access to device A. […] "

Autosummary: Potentially exposed information includes contract number, customer name (contract name), name of customer contact, telephone number, email address, address, information related to service use. "


PHP-CGI RCE Flaw Exploited in Attacks on Japan"s Tech, Telecom, and E-Commerce Sectors

exploits Telcos
2025-03-07 https://thehackernews.com/2025/03/php-cgi-rce-flaw-exploited-in-attacks.html
Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. "The attacker has exploited the vulnerability CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines," Cisco Talos researcher Chetan Raghuprasad said in a technical "

Autosummary: "


Data breach at Japanese telecom giant NTT hits 18,000 companies

financial Telcos
2025-03-07 https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/
Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident. [...] "

Autosummary: "


Russia warns financial sector organizations of IT service provider LANIT compromise

financial Telcos
2025-02-25 https://securityaffairs.com/174604/hacking/russia-warns-financial-sector-lanit-hack.html
Russia’s NKTsKI warns financial sector organizations about a breach at major Russian IT service and software provider LANIT. Russia’s National Coordination Center for Computer Incidents (NKTsKI) warns the financial sector of security breach at IT service and software provider LANIT, potentially affecting LANTER and LAN ATMservice. According to the security breach notification published by GosSOPKA, […] "

Autosummary: Founded in 1989, LANIT offers a wide range of IT solutions, including system integration, software development, cybersecurity, cloud services, and IT consulting. "


Russia warns financial sector of major IT service provider hack

financial Telcos
2025-02-24 https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/
Russia"s National Coordination Center for Computer Incidents (NKTsKI) is warning organizations in the country"s credit and financial sector about a breach at LANIT, a major Russian IT service and software provider. [...] "

Autosummary: "


Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

exploits Telcos
2025-02-21 https://thehackernews.com/2025/02/cisco-confirms-salt-typhoon-exploited.html
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. "The threat actor then demonstrated their ability to persist in target environments across equipment from multiple "

Autosummary: "In addition, we have observed the threat actor capturing SNMP, TACACS, and RADIUS traffic, including the secret keys used between network devices and TACACS/RADIUS servers," Talos noted. "


Chinese hackers use custom malware to spy on US telecom networks

exploits Telcos
2025-02-20 https://www.bleepingcomputer.com/news/security/salt-typhoon-uses-jumbledpath-malware-to-spy-on-us-telecom-networks/
The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially capture sensitive data in cyberattacks on U.S. telecommunication providers. [...] "

Autosummary: These attacks have targeted well-known manufacturers, including Fortinet, Barracuda, SonicWall, Check Point, D-Link, Cisco, Juniper, NetGear, and Sophos. "


Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers

exploits Telcos
2025-02-20 https://securityaffairs.com/174460/apt/salt-typhoon-custom-malware-jumbledpath-to-spy-u-s-telecom-providers.html
China-linked cyber espionage group Salt Typhoon uses custom malware JumbledPath to on spy U.S. telecom providers. Cisco Talos researchers reported that China-linked APT group Salt Typhoon uses a custom-built utility, dubbed JumbledPath, to spy on network traffic of U.S. telecommunication providers. China-linked APT group Salt Typhoon (also known as FamousSparrow and GhostEmperor) and has been active since at least 2019 and […] "

Autosummary: Cisco reported that Salt Typhoon used stolen credentials, captured network configs, and intercepted SNMP, TACACS, and RADIUS traffic to gather more credentials for further access.Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers Pierluigi Paganini February 20, 2025 February 20, 2025 China-linked cyber espionage group Salt Typhoon uses custom malware JumbledPath to on spy U.S. telecom providers. The China-linked APT group is still targeting telecommunications providers worldwide, and according to a report recently published by Recorded Future’s Insikt Group, the threat actors has breached more U.S. telecommunications providers by exploiting unpatched Cisco IOS XE network devices. "


Chinese hackers breach more US telecoms via unpatched Cisco routers

Telcos
2025-02-14 https://www.bleepingcomputer.com/news/security/chinese-hackers-breach-more-us-telecoms-via-unpatched-cisco-routers/
China"s Salt Typhoon hackers are still actively targeting telecoms worldwide and have breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices. [...] "

Autosummary: "


China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws

exploits Telcos
2025-02-14 https://securityaffairs.com/174226/apt/salt-typhoon-exploited-cisco-ios-xe-flaws.html
China-linked APT Salt Typhoon has breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices. China-linked APT group Salt Typhoon is still targeting telecommunications providers worldwide, and according to a new report published by Recorded Future’s Insikt Group, the threat actors has breached more U.S. telecommunications providers by exploiting unpatched Cisco IOS XE […] "

Autosummary: China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws Pierluigi Paganini February 14, 2025 February 14, 2025 China-linked APT Salt Typhoon has breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices. “The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s (ASD’s) "


US sanctions Chinese firm, hacker behind telecom and Treasury hacks

Telcos
2025-01-17 https://www.bleepingcomputer.com/news/security/us-sanctions-chinese-firm-hacker-behind-telecom-and-treasury-hacks/
The U.S. Department of the Treasury"s Office of Foreign Assets Control (OFAC) has sanctioned Yin Kecheng, a Shanghai-based hacker for his role in the recent Treasury breach and a company associated with the Salt Typhoon threat group. [...] "

Autosummary: Last week, the Treasury announced that the operation was conducted by “Silk Typhoon” (a.k.a. Hafnium), a team of skilled cyberspies who target a broad range of organizations in the U.S., Japan, Australia, and Vietnam. "


FCC orders telecoms to secure their networks after Salt Tyhpoon hacks

Telcos
2025-01-17 https://www.bleepingcomputer.com/news/security/fcc-orders-telecoms-to-secure-their-networks-after-salt-tyhpoon-hacks/
The Federal Communications Commission (FCC) has ordered U.S. telecommunications carriers to secure their networks following last year"s Salt Typhoon security breaches. [...] "

Autosummary: Anne Neuberger, the White House"s deputy national security adviser for cyber and emerging technologies, told reporters that the hackers breached nine U.S. carriers (including Windstream, Charter, and Consolidated Communications) and telecom companies in dozens of other countries. "


China-linked Salt Typhoon APT compromised more US telecoms than previously known

Telcos
2025-01-06 https://securityaffairs.com/172724/intelligence/china-linked-salt-typhoon-breached-multiple-us.html
China-linked Salt Typhoon group that breached multiple US telecoms compromised more firms than previously known, WSJ says. The China-linked cyberespionage group Salt Typhoon targeted more US telecoms than previously known, as The Wall Street Journal reported. According to WSJ, wich cited people familiar with the matter, the Chinese cyberspies also compromised Charter Communications and Windstream. […] "

Autosummary: China-linked Salt Typhoon APT compromised more US telecoms than previously known Pierluigi Paganini January 06, 2025 January 06, 2025 China-linked Salt Typhoon group that breached multiple US telecoms compromised more firms than previously known, WSJ says. "


China-linked APT Salt Typhoon breached a ninth U.S. telecommunications firm

Telcos
2024-12-29 https://securityaffairs.com/172425/apt/salt-typhoon-breached-ninth-u-s-telco.html
A White House official confirmed that China-linked threat actor Salt Typhoon breached a ninth U.S. telecommunications company. A White House official confirmed confirmed that China-linked APT group Salt Typhoon has breached a ninth U.S. telecoms company as part of a cyberespionage campaign aimed at telco firms worldwide. “A White House official said Friday the US […] "

Autosummary: “The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s (ASD’s) "


White House links ninth telecom breach to Chinese hackers

Telcos
2024-12-27 https://www.bleepingcomputer.com/news/security/white-house-links-ninth-telecom-breach-to-chinese-hackers/
A White House official has added a ninth U.S. telecommunications company to the list of telecoms breached in a Chinese hacking campaign that impacted dozens of countries. [...] "

Autosummary: "


CISA urges switch to Signal-like encrypted messaging apps after telecom hacks

Telcos
2024-12-18 https://www.bleepingcomputer.com/news/security/cisa-urges-switch-to-signal-like-encrypted-messaging-apps-after-telecom-hacks/
Today, CISA urged senior government and political officials to switch to end-to-end encrypted messaging apps like Signal following a wave of telecom breaches across dozens of countries, including eight carriers in the United States. [...] "

Autosummary: " Signal nominated as secure messaging alternative In today"s advisory, CISA recommends switching to an end-to-end encrypted messaging application, naming Signal as an alternative for mobile communication across multiple mobile (iOS, Android) and desktop (macOS, Windows, and Linux) platforms. "


Wyden proposes bill to secure US telecoms after Salt Typhoon hacks

Telcos
2024-12-10 https://www.bleepingcomputer.com/news/security/wyden-proposes-bill-to-secure-us-telecoms-after-salt-typhoon-hacks/
U.S. Senator Ron Wyden of Oregon announced a new bill to secure the networks of American telecommunications companies breached by Salt Typhoon Chinese state hackers earlier this year. [...] "

Autosummary: Also tracked as Earth Estries, Ghost Emperor, FamousSparrow, and UNC2286, the Salt Typhoon Chinese state-sponsored hacking group has been active since at least 2019, breaching government entities and telecom companies across Southeast Asia. "


Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast

Telcos
2024-12-08 https://www.helpnetsecurity.com/2024/12/08/week-in-review-veeam-service-provider-console-flaws-fixed-patch-tuesday-forecast/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) Veeam has fixed two vulnerabilities in Veeam Service Provider Console (VSPC), one of which (CVE-2024-42448) may allow remote attackers to achieve code exection on the VSPC server machine. December 2024 Patch Tuesday forecast: The secure future initiative impact It seems like 2024 just started, but the final Patch Tuesday of … More

The post Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast appeared first on Help Net Security.

"

Autosummary: Building trust in tokenized economies In this Help Net Security video, Jeremy Bradley, COO of Zama, explores the emerging privacy-preserving technologies that can help solve this challenge, focusing on Fully Homomorphic Encryption (FHE), which enables data to remain encrypted even during processing, positioning it as a potential cornerstone for secure, decentralized environments. Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks In this Help Net Security interview, Niv Braun, CEO at Noma Security, discusses the difficulties security teams face due to the fragmented nature of AI processes, tools, and teams across the data and AI lifecycle. New infosec products of the week: December 6, 2024 Here’s a look at the most interesting products from the past week, featuring releases from Datadog, Fortinet, Radiant Logic, Sweet Security, Tenable, and Veza. "


8 US telcos compromised, FBI advises Americans to use encrypted communications

Telcos
2024-12-05 https://www.helpnetsecurity.com/2024/12/05/us-telcos-compromised-fbi-advises-use-of-encrypted-communications/

FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks and systems of US telecommunication companies. NBC News reported that the advice was given during a conference call with the media on Tuesday, during which the official also shared that the compromise of the networks of multiple US telcos … More

The post 8 US telcos compromised, FBI advises Americans to use encrypted communications appeared first on Help Net Security.

"

Autosummary: "


US arrests Scattered Spider suspect linked to telecom hacks

Telcos
2024-12-05 https://www.bleepingcomputer.com/news/security/us-arrests-scattered-spider-suspect-linked-to-telecom-hacks/
​U.S. authorities have arrested a 19-year-old teenager linked to the notorious Scattered Spider cybercrime gang who is now charged with breaching a U.S. financial institution and two unnamed telecommunications firms. [...] "

Autosummary: "Sosa" and "Elijah," of Palm Coast, Florida; Evans Onyeaka Osiebo, 20, of Dallas, Texas; Joel Martin Evans, 25, a.k.a. "joeleoli," of Jacksonville, North Carolina; Tyler Robert Buchanan, 22, of the United Kingdom. "


China-linked APT Salt Typhoon has breached telcos in dozens of countries

Telcos
2024-12-05 https://securityaffairs.com/171692/apt/china-salt-typhoon-breached-telecommunications.html
China-linked APT group Salt Typhoon has breached telecommunications companies in dozens of countries, US govt warns. President Biden’s deputy national security adviser Anne Neuberger said that China-linked APT group Salt Typhoon has breached telecommunications companies in dozens of countries. The Wall Street Journal reported that the senior White House official revealed that at least eight […] "

Autosummary: In September, the Wall Street Journal reported that China-linked APT group Salt Typhoon (also known as FamousSparrow and GhostEmperor) breached U.S. broadband providers, including Verizon, AT&T, and Lumen Technologies, potentially accessing systems for lawful wiretapping and other data.China-linked APT Salt Typhoon has breached telcos in dozens of countries Pierluigi Paganini December 05, 2024 December 05, 2024 China-linked APT group Salt Typhoon has breached telecommunications companies in dozens of countries, US govt warns. “Specifically, we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders. "


Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console

exploits Telcos
2024-12-04 https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html
Veeam has released security updates to address a critical flaw impacting Service Provider Console (VSPC) that could pave the way for remote code execution on susceptible instances. The vulnerability, tracked as CVE-2024-42448, carries a CVSS score of 9.9 out of a maximum of 10.0. The company noted that the bug was identified during internal testing. "From the VSPC management agent machine, under "

Autosummary: "


Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks

Telcos
2024-12-04 https://thehackernews.com/2024/12/joint-advisory-warns-of-prc-backed.html
A joint advisory issued by Australia, Canada, New Zealand, and the U.S. has warned of a broad cyber espionage campaign undertaken by People"s Republic of China (PRC)-affiliated threat actors targeting telecommunications providers. "Identified exploitations or compromises associated with these threat actors" activity align with existing weaknesses associated with victim infrastructure; no novel "

Autosummary: "


Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks

Telcos
2024-12-04 https://securityaffairs.com/171644/hacking/prc-linked-cyber-espionage-telecom-networks.html
Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks in a joint advisory. Australia, Canada, New Zealand, and the U.S. issued a joint advisory to warn of People’s Republic of China (PRC)-linked cyber espionage targeting telecom networks. “The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal […] "

Autosummary: Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks Pierluigi Paganini December 04, 2024 December 04, 2024 Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks in a joint advisory. In September, the Wall Street Journal reported that China-linked APT group Salt Typhoon (also known as FamousSparrow and GhostEmperor) breached U.S. broadband providers, including Verizon, AT&T, and Lumen Technologies, potentially accessing systems for lawful wiretapping and other data. “Specifically, we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders. "


White House: Salt Typhoon hacked telcos in dozens of countries

Telcos
2024-12-04 https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/
​Chinese state hackers, known as Salt Typhoon, have breached telecommunications companies in dozens of countries, President Biden"s deputy national security adviser Anne Neuberger said today. [...] "

Autosummary: Released with the FBI, the NSA, and international partners, this joint advisory includes tips on hardening network security to shrink the attack surface targeted by the Chinese state hackers, including unpatched devices, vulnerable services exposed to online access, and generally less-secured environments. "


Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449)

Telcos
2024-12-03 https://www.helpnetsecurity.com/2024/12/03/vspc-vulnerabilities-cve-2024-42448-cve-2024-42449/

Veeam has fixed two vulnerabilities in Veeam Service Provider Console (VSPC), one of which (CVE-2024-42448) may allow remote attackers to achieve code exection on the VSPC server machine. The vulnerabilities Veeam Service Provider Console is a cloud-enabled platform that allows enterprises to manage and monitor backup operations across their offices. It’s also used by service providers to deliver Backup-as-a-Service (BaaS) and Disaster Recovery-as-a-Service (DRaaS) services to customers. The solution uses management agents to interact with … More

The post Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) appeared first on Help Net Security.

"

Autosummary: "


US shares tips to block hackers behind recent telecom breaches

Telcos
2024-12-03 https://www.bleepingcomputer.com/news/security/us-shares-tips-to-block-hackers-behind-recent-telecom-breaches/
​CISA released guidance today to help network defenders harden their systems against attacks coordinated by the Salt Typhoon Chinese threat group that breached multiple major global telecommunications providers earlier this year. [...] "

Autosummary: Other hardening best practices highlighted in today"s advisory include: Patching and upgrading devices promptly, Disabling all unused, unauthenticated, or unencrypted protocols, Limiting management connections and privileged accounts, Using and storing passwords securely, Using only strong cryptography. "


Veeam warns of critical RCE bug in Service Provider Console

exploits Telcos
2024-12-03 https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/
​Veeam released security updates today to address two Service Provider Console (VSPC) vulnerabilities, including a critical remote code execution (RCE) discovered during internal testing. [...] "

Autosummary: "


U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

Telcos
2024-11-28 https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html
U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed. These intrusion attempts "originated from a wireline provider"s network that was connected to ours," Jeff Simon, chief security officer at T-Mobile, said in a statement. "We see no instances of prior attempts like "

Autosummary: "


Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

exploits Telcos
2024-11-26 https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part of its attacks targeting Southeast Asian telecommunications companies.  Trend Micro, which described the hacking group as an aggressive advanced persistent threat (APT), said the intrusions also involved the use of another cross-platform backdoor dubbed "

Autosummary: Victims have been identified across over a dozen countries, including Afghanistan, Brazil, Eswatini, India, Indonesia, Malaysia, Pakistan, the Philippines, South Africa, Taiwan, Thailand, the U.S., and Vietnam. "


Salt Typhoon hackers backdoor telcos with new GhostSpider malware

exploits Telcos
2024-11-25 https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/
The Chinese state-sponsored hacking group Salt Typhoon has been observed utilizing a new "GhostSpider" backdoor in attacks against telecommunication service providers. [...] "

Autosummary: CVE-2023-46805, CVE-2024-21887 (Ivanti Connect Secure VPN) (Ivanti Connect Secure VPN) CVE-2023-48788 (Fortinet FortiClient EMS) (Fortinet FortiClient EMS) CVE-2022-3236 (Sophos Firewall) (Sophos Firewall) CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065 (Microsoft Exchange – ProxyLogon) Salt Typhoon uses LOLbin tools for intelligence gathering and lateral network movement in the post-compromise phase. According to Trend Micro, Salt Typhoon has attacked telecommunications, government entities, technology, consulting, chemicals, and transportation sectors in the U.S., Asia-Pacific, Middle East, South Africa, and other regions. Attribution diagram Source: Trend Micro Salt Typhoon"s global campaigns Salt Typhoon (aka "Earth Estries", "GhostEmperor", or "UNC2286") is a sophisticated hacking group that has been active since at least 2019 and typically focuses on breaching government entities and telecommunications companies. "


China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

Telcos
2024-11-20 https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html
A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection. Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications "

Autosummary: " Some of the custom tools in its arsenal are SIGTRANslator, CordScan, and PingPong, which come with the following capabilities - SIGTRANslator, a Linux ELF binary designed to send and receive data using SIGTRAN protocols CordScan, a network-scanning and packet-capture utility containing built-in logic to fingerprint and retrieve data relating to common telecommunication protocols from infrastructure such as the Serving GPRS Support Node (SGSN) "


Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign

exploits Telcos
2024-11-19 https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information. The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets." It"s not clear what information was taken, if any, "

Autosummary: The second infection sequence, in contrast, is a lot more sophisticated, with the threat actors abusing susceptible Microsoft Exchange servers to implant the China Chopper web shell, which is then used to deliver Cobalt Strike, Zingdoor, and Snappybee (aka Deed RAT), a suspected successor to the ShadowPad malware.In August 2023, the spy crew was linked to a series of attacks aimed at government and technology industries based in the Philippines, Taiwan, Malaysia, South Africa, Germany, and the U.S. Analysis shows that the threat actors have methodically crafted their payloads and made use of an interesting combination of legitimate and bespoke tools and techniques to bypass defenses and maintain access to their targets. "


T-Mobile is one of the victims of the massive Chinese breach of telecom firms

Telcos
2024-11-18 https://securityaffairs.com/171127/apt/t-mobile-victim-chinese-breach-of-telco-firms.html
T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it was hacked as part of a long-running cyber espionage campaign targeting Telco companies. Recently, the FBI and CISA announced they are continuing to investigate a large-scale cyber-espionage campaign by China-linked threat actors targeting U.S. telecoms, […] "

Autosummary: “T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been impacted in any significant way, and we have no evidence of impacts to customer information,” a company spokeswoman told WSJ. In September, the Wall Street Journal reported that China-linked APT group Salt Typhoon (also known as FamousSparrow and GhostEmperor) breached U.S. broadband providers, including Verizon, AT&T, and Lumen Technologies, potentially accessing systems for lawful wiretapping and other data. "


T-Mobile confirms it was hacked in recent wave of telecom breaches

Telcos
2024-11-16 https://www.bleepingcomputer.com/news/security/t-mobile-confirms-it-was-hacked-in-recent-wave-of-telecom-breaches/
T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. [...] "

Autosummary: "


FBI confirms China-linked cyber espionage involving breached telecom providers

Telcos
2024-11-14 https://www.helpnetsecurity.com/2024/11/14/cyber-espionage-telecommunications-us/

After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the attacks, which were part of a “broad and significant cyber espionage campaign.” “Specifically, we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private … More

The post FBI confirms China-linked cyber espionage involving breached telecom providers appeared first on Help Net Security.

"

Autosummary: "


US govt officials’ communications compromised in recent telecom hack

Telcos
2024-11-13 https://www.bleepingcomputer.com/news/security/chinese-hackers-compromised-us-government-officials-private-communications-in-recent-telecom-breach/
CISA and the FBI confirmed that Chinese hackers compromised the "private communications" of a "limited number" of government officials after breaching multiple U.S. broadband providers. [...] "

Autosummary: "


U.S. agency cautions employees to limit phone use due to Salt Typhoon hack of telco providers

Telcos
2024-11-10 https://securityaffairs.com/170737/hacking/u-s-agency-limit-phone-use-due-to-salt-typhoon-hack.html
US CFPB warns employees to avoid work-related mobile calls and texts following China-linked Salt Typhoon hack over security concerns. The US government’s Consumer Financial Protection Bureau (CFPB) advises employees to avoid using cellphones for work after China-linked APT group Salt Typhoon hackers breached major telecom providers. The Consumer Financial Protection Bureau (CFPB) is a U.S. […] "

Autosummary: “ In August, Volexity researchers reported that a China-linked APT group, tracked as StormBamboo (aka Evasive Panda, Daggerfly, and StormCloud), successfully compromised an undisclosed internet service provider (ISP) in order to poison DNS responses for target organizations. Cisco addressed an NX-OS zero-day, tracked as CVE-2024-20399 (CVSS score of 6.0), that the China-linked group Velvet Ant exploited to deploy previously unknown malware as root on vulnerable switches. "


US says Chinese hackers breached multiple telecom providers

Telcos
2024-10-28 https://www.bleepingcomputer.com/news/security/us-says-chinese-hackers-breached-multiple-telecom-providers/
The FBI and the U.S. Cybersecurity & Infrastructure Security Agency (CISA) have disclosed that Chinese hackers breached commercial telecommunication service providers in the United States. [...] "

Autosummary: Still, its statement aims to remind important organizations in the country to implement strict security measures, including multi-factor authentication protection, logging, traffic monitoring, and anti-phishing training. "


France’s second-largest telecoms provider Free suffered a cyber attack

Telcos
2024-10-28 https://securityaffairs.com/170333/data-breach/free-suffered-a-cyber-attack.html
French internet service provider (ISP) Free disclosed a cyber attack, threat actors allegedly had access to customer personal information. Free S.A.S. is a French telecommunications company, subsidiary of Iliad S.A. that provides voice, video, data, and Internet telecommunications to consumers in France. The company is the second-largest ISP in France with over 22.9 million mobile and fixed subscribers. Free disclosed a cyber attack over the […] "

Autosummary: “No passwords” , “no bank cards” , “no content of communications (emails, SMS, voice messages, etc.)” are affected by this attack, the date and extent of which have not been specified, the company added. "


Patelco Credit Union data breach impacted over 1 million people

financial Telcos
2024-09-30 https://securityaffairs.com/169139/cyber-crime/patelco-credit-union-data-breach.html
The ransomware attack on Patelco Credit Union this summer led to a data breach affecting over 1 million individuals, revealed the company. Patelco Credit Union is a member-owned, not-for-profit credit union that serves Northern California, particularly the San Francisco Bay Area. Founded in 1936, it is one of the oldest and largest credit unions in the […] "

Autosummary: Patelco Credit Union data breach impacted over 1 million people Pierluigi Paganini September 30, 2024 September 30, 2024 The ransomware attack on Patelco Credit Union this summer led to a data breach affecting over 1 million individuals, revealed the company. "


China-linked APT group Salt Typhoon compromised some U.S. internet service providers (ISPs)

Telcos
2024-09-26 https://securityaffairs.com/168941/apt/salt-typhoon-china-linked-threat-actors-breached-us-isp.html
China-linked threat actors compromised some U.S. internet service providers (ISPs) as part of a cyber espionage campaign code-named Salt Typhoon. China-linked threat actors have breached several U.S. internet service providers in recent months as part of a cyber espionage campaign code-named Salt Typhoon. The state-sponsored hackers aimed at gathering intelligence from the targets or carrying […] "

Autosummary: “The threat actor was attempting to steal all data stored in the active directory, compromising every single username and password in the organization, along with other personally identifiable information, billing data, call detail records, credentials, email servers, geo-location of users, and more.” Since May 2020, over 200,000 devices, including SOHO routers, NVR/DVR devices, NAS servers, and IP cameras, have been compromised and added to the Raptor Train botnet, making it one of the largest China-linked IoT botnets discovered.“ In August, Volexity researchers reported that a China-linked APT group, tracked as StormBamboo (aka Evasive Panda, Daggerfly, and StormCloud), successfully compromised an undisclosed internet service provider (ISP) in order to poison DNS responses for target organizations. Macma is a modular backdoor that supports multiple functionalities, including device fingerprinting, executing commands, screen capture, keylogging, audio capture, uploading and downloading files. "


Did Israel infiltrate Lebanese telecoms networks?

Telcos
2024-09-24 https://securityaffairs.com/168817/intelligence/did-israel-infiltrate-lebanese-telecoms-networks.html
Israel has been sending text messages, recordings, and hacking radio networks to warn Lebanese citizens to evacuate certain areas. Israel has been sending text messages, recordings, and hacking radio networks to warn Lebanese citizens to evacuate certain areas in the country, likely due to an imminent full-scale strike. Following these warnings, massive bombings in southern […] "

Autosummary: Pierluigi Paganini September 24, 2024 September 24, 2024 Israel has been sending text messages, recordings, and hacking radio networks to warn Lebanese citizens to evacuate certain areas. "


Patelco notifies 726,000 customers of ransomware data breach

financial exploits ransomware Telcos
2024-08-26 https://www.bleepingcomputer.com/news/security/patelco-notifies-726-000-customers-of-ransomware-data-breach/
Patelco Credit Union warns customers it suffered a data breach after personal data was stolen in a RansomHub ransomware attack earlier this year. [...] "

Autosummary: "


American Patelco Credit Union suffered a ransomware attack

exploits ransomware Telcos
2024-07-03 https://securityaffairs.com/165152/hacking/patelco-credit-union-ransomware-attack.html
The American credit union Patelco Credit Union shut down several of its banking systems to contain a ransomware attack. Patelco Credit Union is a member-owned, not-for-profit credit union that serves Northern California, particularly the San Francisco Bay Area. Founded in 1936, it is one of the oldest and largest credit unions in the country. With more […] "

Autosummary: "


Patelco shuts down banking systems following ransomware attack

financial exploits ransomware Telcos
2024-07-02 https://www.bleepingcomputer.com/news/security/patelco-shuts-down-banking-systems-following-ransomware-attack/
Patelco Credit Union has disclosed it experienced a ransomware attack that led to the proactive shutdown of several of its customer-facing banking systems to contain the incident"s impact. [...] "

Autosummary: It offers a wide range of financial services, including checking and savings accounts, loans, credit cards, investment services, and insurance plans. "


Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021

Telcos
2024-06-20 https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators located in a single Asian country at least since 2021. "The attackers placed backdoors on the networks of targeted companies and also attempted to steal credentials," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News "

Autosummary: "


China-linked spies target Asian Telcos since at least 2021

Telcos
2024-06-20 https://securityaffairs.com/164735/apt/china-cyberspies-target-asian-telcos.html
A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021. The Symantec Threat Hunter Team reported that an alleged China-linked APT group has infiltrated several telecom operators in a single, unnamed, Asian country at least since 2021. The threat actors used tools associated with Chinese espionage groups, they […] "

Autosummary: They deployed custom keylogging malware, port scanning tools, credential theft through the dumping of registry hives, a publicly available tool known as Responder that acts as a Link-Local Multicast Name Resolution (LLMNR) NetBIOS Name Service (NBT-NS) and multicast DNS (mDNS) poisoner, and enabling RDP.China-linked spies target Asian Telcos since at least 2021 Pierluigi Paganini June 20, 2024 June 20, 2024 A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021. "


RansomHub gang claims the hack of the telecommunications giant Frontier Communications

Telcos
2024-06-04 https://securityaffairs.com/164126/data-breach/ransomhub-gang-hacked-frontier-communications.html
The RansomHub ransomware group added the American telecommunications company Frontier Comunications to the list of victims on its Tor leak site. The RansomHub ransomware group claimed to have stolen the information of over 2 million customers from the American telecommunications company Frontier Communications. The RansomHub group claims to have stolen 5GB of data from the […] "

Autosummary: “Based on our investigation, we have determined that the third party was likely a cybercrime group, which gained access to, among other information, personally identifiable information.” reads the Form 10-Q (quarterly report of financial performance) filed by the company with the SEC in May. "


Wireless carriers fined $200 million after illegally sharing customer location data

Telcos
2024-05-01 https://www.malwarebytes.com/blog/news/2024/05/wireless-carriers-fined-200-million-after-illegally-sharing-customer-location-data
Four major wireless carriers have been fined by the FCC for sharing access to customers’ location data without consent. "

Autosummary: The FCC fined AT&T, Sprint, T-Mobile, and Verizon a total of almost $200 million for “illegally sharing access to customers’ location information without consent and without taking reasonable measures to protect that information against unauthorized disclosure.” "


The FCC imposes $200 million in fines on four US carriers for unlawfully sharing user location data

Telcos
2024-04-30 https://securityaffairs.com/162540/laws-and-regulations/fcc-fined-4-us-wireless-carriers.html
The Federal Communications Commission (FCC) fined the largest U.S. wireless carriers $200 million for sharing customers’ real-time location data without consent. The FCC has fined four major U.S. wireless carriers nearly $200 million for unlawfully selling access to real-time location data of their customers without consent. The fines come as a result of the Notices of Apparent Liability […] "

Autosummary: The FCC imposes $200 million in fines on four US carriers for unlawfully sharing user location data Pierluigi Paganini April 30, 2024 April 30, 2024 The Federal Communications Commission (FCC) fined the largest U.S. wireless carriers $200 million for sharing customers’ real-time location data without consent. "


FCC fines major wireless carriers over illegal location data sharing

Telcos
2024-04-30 https://www.helpnetsecurity.com/2024/04/30/fcc-wireless-carriers-fines/

The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without consent and without taking reasonable measures to protect that information against unauthorized disclosure. Wireless carriers shared access to customers’ location data Sprint and T-Mobile – which have merged since the investigation began – face fines of more than $12 million and $80 million, respectively. AT&T is fined more than $57 million, and Verizon is fined … More

The post FCC fines major wireless carriers over illegal location data sharing appeared first on Help Net Security.

"

Autosummary: Wireless carriers continued to sell access to location data The investigations that led to these fines started following public reports that customers’ location information was being disclosed by the largest American wireless carriers without customer consent or other legal authorization to a Missouri Sheriff through a “location-finding service” operated by Securus, a provider of communications services to correctional facilities, to track the location of numerous individuals. "


FCC fines carriers $200 million for illegally sharing user location

Telcos
2024-04-29 https://www.bleepingcomputer.com/news/technology/fcc-fines-carriers-200-million-for-illegally-sharing-user-location/
​The Federal Communications Commission (FCC) has fined the largest U.S. wireless carriers almost $200 million for sharing their customers" real-time location data without their consent. [...] "

Autosummary: During the investigation, the FCC"s Enforcement Bureau found that each of the four mobile carriers sold their customers" real-time location data to "aggregators," who then resold this information to dozens of third-party location-based service providers, revealing where the customers were going and who they were. "


AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks

Telcos
2024-04-05 https://thehackernews.com/2024/04/ai-as-service-providers-vulnerable-to.html
New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers" models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. "Malicious models represent a major risk to AI systems, "

Autosummary: "Malicious models represent a major risk to AI systems, especially for AI-as-a-service providers because potential attackers may leverage these models to perform cross-tenant attacks," Wiz researchers Shir Tamari and Sagi Tzadik said. "


Russian Hackers Target Ukrainian Telecoms with Upgraded "AcidPour" Malware

exploits rusia-ucrania Telcos
2024-03-22 https://thehackernews.com/2024/03/russian-hackers-target-ukrainian.html
The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show. The cybersecurity firm also confirmed connections between the malware and AcidRain, tying it to threat activity clusters associated with Russian military intelligence. "AcidPour"s expanded capabilities would enable it to better "

Autosummary: "AcidPour"s expanded capabilities would enable it to better disable embedded devices including networking, IoT, large storage (RAIDs), and possibly ICS devices running Linux x86 distributions," security researchers Juan Andres Guerrero-Saade and Tom Hegel said. "


Former telecom manager admits to doing SIM swaps for $1,000

Telcos
2024-03-15 https://www.bleepingcomputer.com/news/security/former-telecom-manager-admits-to-doing-sim-swaps-for-1-000/
A former manager at a telecommunications company in New Jersey pleaded guilty to conspiracy charges for accepting money to perform unauthorized SIM swaps that enabled an accomplice to hack customer accounts. [...] "

Autosummary: "


Threat actors hacked Taiwan-based Chunghwa Telecom

Telcos
2024-03-04 https://securityaffairs.com/159918/data-breach/chunghwa-telecom-data-breach.html
Threat actors stole sensitive and confidential data from the telecom giant Chunghwa Telecom Company, revealed the Ministry of National Defense. Chunghwa Telecom Company, Ltd. (literally Chinese Telecom Company) is the largest integrated telecom service provider in Taiwan, and the incumbent local exchange carrier of PSTN, Mobile, and broadband services in the country. Threat actors stole […] "

Autosummary: "


New GTPDOOR backdoor is designed to target telecom carrier networks

Telcos
2024-03-04 https://securityaffairs.com/159929/hacking/gtpdoor-backdoor-telecom-carrier-networks.html
Researcher HaxRob discovered a previously undetected Linux backdoor named GTPDOOR, designed to target telecom carrier networks. Security researcher HaxRob discovered a previously undetected Linux backdoor dubbed GTPDOOR, which is specifically crafted to carry out stealth cyber operations within mobile carrier networks. The researcher believes that the threat actors behind GTPDOOR focuses on systems proximate to […] "

Autosummary: GTPDOOR is a "magic/wakeup" packet backdoor that uses a novel C2 transport protocol: GTP (GPRS Tunnelling Protocol), silently listening on the GRX network (1/n) 🧵 pic.twitter.com/IwuEcL14lx — HaxRob (@haxrob) February 28, 2024 The researcher believes that the threat actors behind GTPDOOR focuses on systems proximate to the GPRS Roaming eXchange (GRX), such as SGSN, GGSN, and P-GW.New GTPDOOR backdoor is designed to target telecom carrier networks Pierluigi Paganini March 04, 2024 March 04, 2024 Researcher HaxRob discovered a previously undetected Linux backdoor named GTPDOOR, designed to target telecom carrier networks.🤔 (3/n)) pic.twitter.com/hAKRJR1KFp — HaxRob (@haxrob) February 28, 2024 Both binaries targeted a very old Red Hat Linux version. "


GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks

exploits Telcos Linux
2024-02-29 https://thehackernews.com/2024/02/gtpdoor-linux-malware-targets-telecoms.html
Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX) The malware is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications. GPRS roaming allows subscribers to access their GPRS services while they are "

Autosummary: "


Stopping a targeted attack on a Managed Service Provider (MSP) with ThreatDown MDR

Telcos
2024-02-28 https://www.malwarebytes.com/blog/business/2024/02/stopping-a-targeted-attack-on-a-managed-service-provider-msp-with-threatdown-mdr
Detecting and disrupting a months-long malware campaign on an MSP. "

Autosummary: Threat hunting with ThreatDown MDR How ThreatDown MDR works MSPs continue to be a prime target in cyber attacks—and as we’ve seen in this case study, attackers are in it for the long-haul, able to remain undetected for several months after compromising a network. The attacker’s use of legitimate tools such as TeamViewer, ScreenConnect, and PowerShell, in their months-long attack on the MSP underscores a key theme we’ve been writing about on the blog recently: attackers are increasingly relying on LOTL techniques in their attacks to avoid detection. "


230K individuals impacted by a data breach suffered by Telco provider Tangerine

financial Telcos
2024-02-23 https://securityaffairs.com/159528/data-breach/telco-provider-tangerine-data-breach.html
Australian telecommunications provider Tangerine disclosed a data breach that impacted roughly 230,000 individuals. Tangerine suffered a data breach that exposed the personal information of roughly 230,000 individuals. The security breach occurred on Sunday 18 February 2024, but Tangerine management became aware of the incident on Tuesday 20 February 2024.   The telco notified the Australian Cyber Security […] "

Autosummary: 230K individuals impacted by a data breach suffered by Telco provider Tangerine Pierluigi Paganini February 23, 2024 February 23, 2024 Australian telecommunications provider Tangerine disclosed a data breach that impacted roughly 230,000 individuals. "


FCC orders telecom carriers to report PII data breaches within 30 days

financial Telcos
2024-02-12 https://www.bleepingcomputer.com/news/security/fcc-orders-telecom-carriers-to-report-pii-data-breaches-within-30-days/
Starting March 13th, telecommunications companies must report data breaches impacting customers" personally identifiable information within 30 days, as required by FCC"s updated data breach reporting requirements. [...] "

Autosummary: The updated data breach reporting rules aim to ensure that "providers of telecommunications, interconnected Voice over Internet Protocol (VoIP), and telecommunications relay services (TRS) are held accountable in their obligations to safeguard sensitive customer information, and to provide customers with the tools needed to protect themselves in the event that their data is compromised. "


20+ hospitals in Romania hit hard by ransomware attack on IT service provider

exploits ransomware Telcos
2024-02-12 https://grahamcluley.com/20-hospitals-in-romania-hit-hard-by-ransomware-attack-on-it-service-provider/
Over 20 hospitals in Bucharest have reportedly been impacted by a ransomware attack after cybercriminals targeted an IT service provider. As a consequence medical staff have been forced to use pen-and-paper rather than computer systems. "

Autosummary: Affected hospitals include: Azuga Orthopaedics and Traumatology Hospital Băicoi City Hospital Buzău County Emergency Hospital C.F. Clinical Hospital no. 2 Bucharest Colțea Clinical Hospital Emergency County Hospital “Dr. Constantin Opriș” Baia Mare Emergency Hospital for Plastic, Reconstructive and Burn Surgery Bucharest Fundeni Clinical Institute Hospital for Chronic Diseases Sf. "


Turkish hackers Sea Turtle expand attacks to Dutch ISPs, telcos

Telcos
2024-01-08 https://www.bleepingcomputer.com/news/security/turkish-hackers-sea-turtle-expand-attacks-to-dutch-isps-telcos/
The Turkish state-backed cyber espionage group tracked as Sea Turtle has been carrying out multiple spying campaigns in the Netherlands, focusing on telcos, media, internet service providers (ISPs), and Kurdish websites. [...] "

Autosummary: Previously, Sea Turtle, also known as Teal Kurma and Cosmic Wolf, focused on the Middle Eastern region, as well as Sweden and the United States, using techniques like DNS hijacking and traffic redirection to perform man-in-the-middle attacks against government and non-government organizations, media, ISPs, and IT service providers. "


Turkish Sea Turtle APT targets Dutch IT and Telecom firms

Telcos
2024-01-07 https://securityaffairs.com/157021/apt/sea-turtle-targets-dutch-entities.html
Sea Turtle cyber espionage group targeted telco, media, ISPs, IT service providers, and Kurdish websites in the Netherlands. Researchers from Dutch security firm Hunt & Hackett observed Sea Turtle cyber espionage group (aka Teal Kurma, Marbled Dust, SILICON and Cosmic Wolf) targeting telco, media, ISPs, IT service providers, and Kurdish websites in the Netherlands. The […] "

Autosummary: The group targets government entities, Kurdish (political) groups like PKK, telecommunication, ISPs, IT-service providers (including security companies), NGO, and Media & Entertainment sectors; Over the years, the group enhanced its evasion capabilities. "


Sea Turtle Cyber Espionage Campaign Targets Dutch IT and Telecom Companies

Telcos
2024-01-06 https://thehackernews.com/2024/01/sea-turtle-cyber-espionage-campaign.html
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of a new cyber espionage campaign undertaken by a Türkiye-nexus threat actor known as Sea Turtle. "The infrastructure of the targets was susceptible to supply chain and island-hopping attacks, which the attack group "

Autosummary: " To mitigate the risks posed by such attacks, it"s advised that organizations enforce strong password policies, implement two-factor authentication (2FA), rate limit login attempts to reduce the chances of brute-force attempts, monitor SSH traffic, and keep all systems and software up-to-date. "


Russian Hackers Had Covert Access to Ukraine"s Telecom Giant for Months

rusia-ucrania Telcos
2024-01-05 https://thehackernews.com/2024/01/russian-hackers-had-covert-access-to.html
Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom operator Kyivstar"s systems at least since May 2023. The development was first reported by Reuters. The incident, described as a "powerful hacker attack," first came to light last month, knocking out access to mobile and internet services "

Autosummary: "


Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

Telcos
2024-01-05 https://securityaffairs.com/156958/cyber-warfare-2/sandworm-inside-kyivstar-for-months.html
Ukrainian authorities revealed that Russia-linked APT Sandworm had been inside telecom giant Kyivstar at least since May 2023. Russia-linked APT group Sandworm was inside Ukrainian telecoms giant Kyivstar from at least May 2023, the head of Ukraine’s Security Service of Ukraine’s (SBU) told Reuters. “This attack is a big message, a big warning, not only to […] "

Autosummary: In 2022, the Russian APT used multiple wipers in attacks aimed at Ukraine,including AwfulShred, CaddyWiper, HermeticWiper, Industroyer2, IsaacWiper, WhisperGate, Prestige, RansomBoggs, and ZeroWipe. "


Online museum collections down after cyberattack on service provider

ciber Telcos
2024-01-02 https://www.bleepingcomputer.com/news/security/online-museum-collections-down-after-cyberattack-on-service-provider/
Museum software solutions provider Gallery Systems has disclosed that its ongoing IT outages were caused by a ransomware attack last week. [...] "

Autosummary: "


Albanian Parliament and One Albania Telecom Hit by Cyber Attacks

Telcos
2023-12-29 https://thehackernews.com/2023/12/albanian-parliament-and-one-albania.html
The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country’s National Authority for Electronic Certification and Cyber Security (AKCESK) revealed this week. “These infrastructures, under the legislation in force, are not currently classified as critical or important information infrastructure,” AKCESK said. One Albania, which has "

Autosummary: "


Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania

Telcos
2023-12-29 https://securityaffairs.com/156644/security/cyber-attacks-hit-albania.html
Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania, a government agency reported. Albania’s National Authority for Electronic Certification and Cyber Security (AKCESK) revealed that cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania. The telecom carrier disclosed the cyber attack with a […] "

Autosummary: Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania Pierluigi Paganini December 29, 2023 December 29, 2023 Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania, a government agency reported. “Yesterday, on December 25, AKCESK was notified of cyber attacks that occurred on the ONE telephone company and the Assembly of the Republic of Albania.” reads the announcement published by AKCESK. "


Iranian Hackers Using MuddyC2Go in Telecom Espionage Attacks Across Africa

Telcos
2023-12-19 https://thehackernews.com/2023/12/iranian-hackers-using-muddyc2go-in-new.html
The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command-and-control (C2) framework called MuddyC2Go in its attacks on the telecommunications sector in Egypt, Sudan, and Tanzania. The Symantec Threat Hunter Team, part of Broadcom, is tracking the activity under the name Seedworm, which is also tracked under the monikers Boggy Serpens, Cobalt "

Autosummary: The Symantec Threat Hunter Team, part of Broadcom, is tracking the activity under the name Seedworm, which is also tracked under the monikers Boggy Serpens, Cobalt Ulster, Earth Vetala, ITG17, Mango Sandstorm (formerly Mercury), Static Kitten, TEMP.Zagros, and Yellow Nix. "


Major Cyber Attack Paralyzes Kyivstar - Ukraine"s Largest Telecom Operator

Telcos
2023-12-13 https://thehackernews.com/2023/12/major-cyber-attack-paralyzes-kyivstar.html
Ukraine"s biggest telecom operator Kyivstar has become the victim of a cyber attack, disrupting customer access to mobile and internet services. "The cyberattack on Ukraine"s #Kyivstar telecoms operator has impacted all regions of the country with high impact to the capital, metrics show, with knock-on impacts reported to air raid alert network and banking sector as work continues "

Autosummary: KillMilk has since announced that he was retiring, and appointed a new leader "Deanon Club," who has claimed that "there will be a large-scale recruitment for the KillNet team, on all fronts" with the goal of striking government financial facilities, encryption firms, and the gambling sector. "


Ukraine"s largest mobile carrier Kyivstar down following cyberattack

ciber Telcos
2023-12-12 https://www.bleepingcomputer.com/news/security/ukraines-largest-mobile-carrier-kyivstar-down-following-cyberattack/
Kyivstar, Ukraine"s largest telecommunications service provider serving over 25 million mobile and home internet subscribers, has suffered a cyberattack impacting mobile and data services. [...] "

Autosummary: The official website is offline, but the company informed subscribers via its social media channels that it was targeted by hackers this morning, causing a technical failure that impacts mobile communications and internet access. "


Kyivstar, Ukraine’s largest mobile carrier brought down by a cyber attack

Telcos
2023-12-12 https://securityaffairs.com/155701/hacking/cyberattack-brought-down-ukraine-kyivstar.html
Kyivstar, the largest Ukraine service provider, was hit by a cyber attack that paralyzed its services. The attack is linked to the ongoing conflict. Kyivstar, the largest Ukraine service provider was down after a major cyber attack. The Ukrainian telecommunications company provides communication services and data transmission based on a broad range of fixed and mobile technologies, […] "

Autosummary: Kyivstar, Ukraine’s largest mobile carrier brought down by a cyber attack Pierluigi Paganini December 12, 2023 December 12, 2023 Kyivstar, the largest Ukraine service provider, was hit by a cyber attack that paralyzed its services. “This morning we became the target of a powerful cyber attack that caused a technical failure that led to temporarily unavailable services: 🔸 mobile connection; 🔸 Internet access. "


New Stealthy "Krasue" Linux Trojan Targeting Telecom Firms in Thailand

exploits Telcos Linux
2023-12-07 https://thehackernews.com/2023/12/new-stealthy-krasue-linux-trojan.html
A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand by threat actors to main covert access to victim networks at lease since 2021. Named after a nocturnal female spirit of Southeast Asian folklore, the malware is "able to conceal its own presence during the initialization phase," Group-IB said in a report "

Autosummary: "


New Krasue Linux RAT targets telecom companies in Thailand

Telcos Linux
2023-12-07 https://securityaffairs.com/155361/malware/krasue-rootkit-targets-thailand.html
A previously undetected Linux RAT dubbed Krasue has been observed targeting telecom companies in Thailand. Group-IB researchers discovered a previously undetected Linux remote access trojan called Krasue has been employed in attacks aimed at telecom companies in Thailand. The Krasue Remote Access Trojan (RAT) has remained undetected since at least 2021 when it was registered on […] "

Autosummary: Threat actors could propagate the threat by exploiting vulnerabilities in Internet-facing systems, conducting credential brute force attacks, and tricking victims into downloading deceptive packages or binaries (i.e., files masquerading as product updates) from untrustworthy third-party sources. "


Optus: Telecom boss Kelly Bayer Rosmarin quits after Australian outage

Telcos
2023-11-20 https://www.bbc.co.uk/news/world-australia-67470796?at_medium=RSS&at_campaign=KARANGA
Kelly Bayer Rosmarin has been under pressure to quit after overseeing a tumultuous period for the firm. "

Autosummary: "


Chilean telecom giant GTD hit by the Rorschach ransomware gang

exploits latam ransomware Telcos
2023-10-25 https://www.bleepingcomputer.com/news/security/chilean-telecom-giant-gtd-hit-by-the-rorschach-ransomware-gang/
Chile"s Grupo GTD warns that a cyberattack has impacted its Infrastructure as a Service (IaaS) platform, disrupting online services. [...] "

Autosummary: "We understand the importance of proactive and fluid communication in the face of incidents, therefore, in accordance with what we previously discussed on the phone, I would like to inform you that we are experiencing a partial impact on services as a result of a cybersecurity incident," reads a GTD security incident notification. On the morning of October 23rd, GTD suffered a cyberattack that impacted numerous services, including its data centers, internet access, and Voice-over-IP (VoIP). "


CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks

ciber Telcos
2023-10-17 https://thehackernews.com/2023/10/cert-ua-reports-11-ukrainian-telecom.html
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfered" with at least 11 telecommunication service providers in the country between May and September 2023. The agency is tracking the activity under the name UAC-0165, stating the intrusions led to service interruptions for customers. The starting point of the attacks is a reconnaissance phase in "

Autosummary: "


Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Telcos
2023-10-17 https://securityaffairs.com/152617/apt/sandworm-ukraine-telecommunication-service.html

Russia-linked APT group Sandworm has hacked eleven telecommunication service providers in Ukraine between since May 2023. The Russia-linked APT group Sandworm (UAC-0165) has compromised eleven telecommunication service providers in Ukraine between May and September 2023, reported the Ukraine’s Computer Emergency Response Team (CERT-UA). According to public sources, the threat actors targeted ICS of at least […]

The post Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers appeared first on Security Affairs.

"

Autosummary: In 2022, the Russian APT used multiple wipers in attacks aimed at Ukraine, including AwfulShred, CaddyWiper, HermeticWiper, Industroyer2, IsaacWiper, WhisperGate, Prestige, RansomBoggs, and ZeroWipe. "


Russian Sandworm hackers breached 11 Ukrainian telcos since May

rusia-ucrania Telcos
2023-10-16 https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-breached-11-ukrainian-telcos-since-may/
The state-sponsored Russian hacking group tracked as "Sandworm" has compromised eleven telecommunication service providers in Ukraine between May and September 2023. [...] "

Autosummary: Additionally, the attackers use tools like "ffuf", "dirbuster", "gowitness", and "nmap" to find potential vulnerabilities in web services that can be exploited to gain access. "


Stayin’ Alive campaign targets high-profile Asian government and telecom entities. Is it linked to ToddyCat APT?

government Telcos
2023-10-13 https://securityaffairs.com/152415/apt/stayin-alive-campaign-toddycat.html

A cyberespionage campaign, tracked as Stayin’ Alive, targeted high-profile government and telecom entities in Asia. Cybersecurity company Check Point uncovered a malicious activity, tracked as Stayin’ Alive, that is targeting high-profile government and telecom entities in Asian countries, including Vietnam, Uzbekistan, Pakistan, and Kazakhstan. The campaign has been active since at least 2021, threat actors employed downloaders […]

The post Stayin’ Alive campaign targets high-profile Asian government and telecom entities. Is it linked to ToddyCat APT? appeared first on Security Affairs.

"

Autosummary: Cybersecurity company Check Point uncovered a malicious activity, tracked as Stayin’ Alive, that is targeting high-profile government and telecom entities in Asian countries, including Vietnam, Uzbekistan, Pakistan, and Kazakhstan. Pierluigi Paganini October 13, 2023 October 13, 2023 A cyberespionage campaign, tracked as Stayin’ Alive, targeted high-profile government and telecom entities in Asia. "


ToddyCat hackers use "disposable" malware to target Asian telecoms

exploits Telcos
2023-10-12 https://www.bleepingcomputer.com/news/security/toddycat-hackers-use-disposable-malware-to-target-asian-telecoms/
A newly discovered campaign dubbed "Stayin" Alive" has been targeting government organizations and telecommunication service providers across Asia since 2021, using a wide variety of "disposable" malware to evade detection. [...] "

Autosummary: Check Point reports that "Stayin" Alive" uses various samples and variants of these loaders and payloads, often tailored to specific regional targets (language, filenames, themes). "


Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants

government Telcos
2023-10-12 https://thehackernews.com/2023/10/researchers-uncover-ongoing.html
High-profile government and telecom entities in Asia have been targeted as part of an ongoing campaign since 2021 that"s designed to deploy basic backdoors and loaders for delivering next-stage malware. Cybersecurity company Check Point is tracking the activity under the name Stayin" Alive. Targets include organizations located in Vietnam, Uzbekistan, Pakistan, and Kazakhstan. "The simplistic "

Autosummary: A closer examination of the command-and-control (C2) infrastructure has revealed a constantly evolving arsenal of loader variants dubbed CurLu, CurCore, and CurLog that are capable of receiving DLL files, executing remote commands, and launch a process associated with a newly generated file to which data from the server is written to. "


European Telecommunications Standards Institute (ETSI) suffered a data breach

financial Telcos
2023-10-03 https://securityaffairs.com/151845/data-breach/etsi-data-breach.html

The European Telecommunications Standards Institute (ETSI) disclosed a data breach, threat actors had access to a database of its users. Threat actors stole a database containing the list of users of the portal of the European Telecommunications Standards Institute (ETSI). The European Telecommunications Standards Institute is an independent, not-for-profit organization based in Europe. The organization […]

The post European Telecommunications Standards Institute (ETSI) suffered a data breach appeared first on Security Affairs.

"

Autosummary: The organization focuses on developing global standards for information and communications technology (ICT) and telecommunications, such as: GSM™, TETRA, 3G, 4G, 5G, DECT™. "


China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

government Telcos
2023-09-28 https://thehackernews.com/2023/09/china-linked-budworm-targeting-middle.html
Government and telecom entities have been subjected to a new wave of attacks by a China-linked threat actor tracked as Budworm using an updated malware toolset. The intrusions, targeting a Middle Eastern telecommunications organization and an Asian government, took place in August 2023, with the adversary deploying an improved version of its SysUpdate toolkit, the Symantec Threat Hunter Team, "

Autosummary: Budworm, also referred to by the names APT27, Bronze Union, Emissary Panda, Iron Tiger, Lucky Mouse, and Red Phoenix, is known to be active since at least 2013, targeting a wide range of industry verticals in pursuit of its intelligence gathering goals. "


Ukrainian hackers take down service provider for Russian banks

financial rusia-ucrania Telcos
2023-06-09 https://www.bleepingcomputer.com/news/security/ukrainian-hackers-take-down-service-provider-for-russian-banks/
A group of Ukrainian hackers known as the Cyber.Anarchy.Squad claimed an attack that took down Russian telecom provider Infotel JSC on Thursday evening. [...] "

Autosummary: "In total, the company has about four hundred clients, a quarter of them are banks, the rest are credit institutions, car dealerships. "


Virtual claims raise alarms among insurance carriers and customers

Telcos
2023-06-05 https://www.helpnetsecurity.com/2023/06/05/insurance-identity-related-fraud/

As the digital revolution changes the claims process, both carriers and customers are increasingly concerned about data privacy, according to LexisNexis Risk Solutions. More than 60% of consumers have concerns over the security of their personally identifiable information when they submit virtual claims. While carriers are worried about the actual cost of fraud, which can cost four times the value of the fraudulent transaction and impact a carrier’s reputation. “Virtual or self-service claims have been … More

The post Virtual claims raise alarms among insurance carriers and customers appeared first on Help Net Security.

"

Autosummary: Leaders are adopting a proactive, multi-layered approach that can include verifying PII, such as name, address and date of birth; using multi-factor or knowledge-based authentication methods, such as one-time passwords, multi-factor authentication or quizzes; using real-time digital risk signals, such as device and email intelligence, behavioral biometrics, link analysis or risk scoring; and using native device biometrics, consortium-based fraud scores or continuous monitoring. "


Russian APT Nomadic Octopus hacked Tajikistani carrier

rusia-ucrania Telcos
2023-05-01 https://securityaffairs.com/145536/apt/nomadic-octopus-targets-tajikistani-carrier.html

Russian APT group Nomadic Octopus hacked a Tajikistani carrier to spy on government officials and public service infrastructures. Russian cyber espionage group Nomadic Octopus (aka DustSquad) has hacked a Tajikistani telecoms provider to spy on 18 entities, including high-ranking government officials, telecommunication services, and public service infrastructures. The cyberspies compromised a broad range of devices, […]

The post Russian APT Nomadic Octopus hacked Tajikistani carrier appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Nomadic Octopus) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On Blogger Awards 2022 – VOTE FOR YOUR WINNERS Vote for me in the sections: The Teacher – Most Educational Blog The Entertainer – Most Entertaining Blog The Tech Whizz – Best Technical Blog Best Social Media Account to Follow (@securityaffairs) Please nominate Security Affairs as your favorite blog. "


Latitude cyberattack leads to data theft at two service providers

ciber Telcos
2023-03-16 https://www.bleepingcomputer.com/news/security/latitude-cyberattack-leads-to-data-theft-at-two-service-providers/
Latitude Financial Services (Latitude) has published a notice on its website today informing that it has suffered a ransomware attack that resulted in the theft of some customer data. [...] "

Autosummary: "


Resecurity warns about cyber-attacks on data center service providers

Telcos
2023-02-22 https://www.helpnetsecurity.com/2023/02/22/resecurity-warns-about-cyber-attacks-on-data-center-service-providers/

Resecurity warns about the increase of malicious cyber activity targeting data center service providers globally. According to the detailed report recently released by the California-based cybersecurity company, during September 2021, Resecurity notified several data center organizations about malicious cyber activity targeting them and their customers. Such organizations act as a critical part of the enterprise supply chain and become a juicy target for nation-state, criminal and cyberespionage groups. The details about this activity have been … More

The post Resecurity warns about cyber-attacks on data center service providers appeared first on Help Net Security.

"

Autosummary: Most organizations identified in the leaked data sets relate to financial institutions (FIs) with a global presence, investment funds, biomedical research companies, technology vendors, e-commerce, online marketplaces, cloud services, ISPs and CDN providers with HQ in the U.S, the U.K, Canada, Australia, New Zealand, Singapore and China. Once the customer credentials were collected, the actor performed active probing to the customer panels aiming to collect information about the representatives of enterprise customers who manage operations at the data center, list of purchased services, and deployed equipment. "


Resecurity warns about cyber-attacks on data center service providers

Telcos
2023-02-21 https://securityaffairs.com/142531/hacking/attacks-data-center-service-providers.html

Resecurity warns about the increase of malicious cyber activity targeting data center service providers globally. According to the detailed report recently released by the California-based cybersecurity company, during September 2021, Resecurity notified several data center organizations about malicious cyber activity targeting them and their customers. Such organizations act as a critical part of the enterprise […]

The post Resecurity warns about cyber-attacks on data center service providers appeared first on Security Affairs.

"

Autosummary: Most organizations identified in the leaked data sets relate to financial institutions (FIs) with a global presence, investment funds, biomedical research companies, technology vendors, e-commerce, online marketplaces, cloud services, ISPs and CDN providers with HQ in the U.S, the U.K, Canada, Australia, New Zealand, Singapore and China. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, data center service providers) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New Threat Actor WIP26 Targeting Telecom Service Providers in the Middle East

Telcos
2023-02-16 https://thehackernews.com/2023/02/new-threat-actor-wip26-targeting.html
Telecommunication service providers in the Middle East are being targeted by a previously undocumented threat actor as part of a suspected espionage-related campaign. Cybersecurity firms SentinelOne and QGroup are tracking the activity cluster under the former"s work-in-progress moniker WIP26. "WIP26 relies heavily on public cloud infrastructure in an attempt to evade detection by making "

Autosummary: "