Notebookcheck

Chinese-affiliated hackers compromised 25 global telecommunications companies for over 7 years

At least 25 global telecommunications companies were compromised in a seven-year attack utilizing Chinese-affiliated threat actor APT10. (Source: ModernDiplomacy)
At least 25 global telecommunications companies were compromised in a seven-year attack utilizing Chinese-affiliated threat actor APT10. (Source: ModernDiplomacy)
A leading cyber-security firm has uncovered a brazen Chinese-affiliated 7-year-long attack against telecommunications companies across the globe, compromising Call Detail Records (CDRs) and allowing collection of call meta-data for intelligence actions against targets.

Note: An earlier version of this article included a teaser image with the names and logos of many the world's top telecommunications companies. It was not our intention to imply that those specific companies were the ones compromised (this information has not been released) and so that image has been replaced.

Leading cyber-security firm Cybereason has today published a report on their identification of a disturbing 7-year-long coordinated attack against more than two dozen global telecommunications companies. The attack was conducted with methods and tools consistent with those used by the Chinese Ministry of State Security, and were likely aimed at retrieving crucial details such as Call Detail Records (CDRs).

Dubbed "Operation Soft Cell" by Cybereason, the attacks were traced back as early as 2012, but may have been active even earlier than that. The attackers used tools to steal credentials from computers and map the carriers' networks. Once credentials were successfully stolen, they were used to create domain-level user accounts with high levels of access to sensitive data. The attacks were conducted with APT10, a threat actor originating from China and believed to be favored by the Chinese Ministry of State Security.

Telecommunications companies don't actually keep the contents of calls and text messages in the CDR, but that does not mean that the data stolen is not useless — in fact, far from it. CDRs contain metadata regarding the call, including physical location, origin, destination, duration, and device-specific information. This information can be used by state actors to track individuals of interest (e.g. politicians, foreign intelligence operatives, etc.).

Even more alarming, according to the report, is the fact that the attackers had complete access to the telecommunications infrastructures for years before being identified by the firm first in 2018. Although outwardly less bombastic than the US strikes that were alleged to have disabled Iran's missile defense systems last week, the strategy of infiltrating and laying dormant for years, waiting for the right time to strike is actually quite similar, and a reminder of the vulnerabilities our technology gives us.

Working For Notebookcheck

Are you a techie who knows how to write? Then join our Team! Especially English native speakers welcome!

Currently wanted: 
News and Editorial Editor - Details here

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > News Archive > Newsarchive 2019 06 > Chinese-affiliated hackers compromised 25 global telecommunications companies for over 7 years
Douglas Black, 2019-06-25 (Update: 2019-06-26)
Douglas Black
Douglas Black - News Editor
Douglas Black is a technology analyst, teacher, writer, and DJ. He is also Managing Editor of UltrabookReview.