article thumbnail

Nation-State Attacker of Telecommunications Networks

Schneier on Security

Someone has been hacking telecommunications networks around the world: LightBasin (aka UNC1945) is an activity cluster that has been consistently targeting the telecommunications sector at a global scale since at least 2016, leveraging custom tools and an in-depth knowledge of telecommunications network architectures.

article thumbnail

CERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RAT

Security Affairs

The modular architecture of the malware allows to extend its functionalities for multiple malicious purposes, including surveillance, reconnaissance, information theft, DDoS attacks, and arbitrary code execution.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-linked LightBasin group accessed calling records from telcos worldwide

Security Affairs

A China-linked hacking group, tracked as LightBasin (aka UNC1945 ), hacked mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019.

article thumbnail

Telecommunications Providers Worldwide Are Targeted in Sophisticated Cyber-Espionage Campaign

Dark Reading

LightBasin has displayed in-depth knowledge of telecom architectures and protocols in its attacks, security vendor warns.

article thumbnail

GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems

The Last Watchdog

SASE architectures must be validated end to end—from users and branches, through SASE points of presence, to cloud application servers. Additionally, performance needs to be profiled across all networks and SASE behavior measured across all architectures—virtualized, containerized, and bare metal Jeyaretnam Test for the real world.

Risk 208
article thumbnail

Operation Soft Cell – Multiple telco firms hacked by nation-state actor

Security Affairs

Once compromised the networks of telecommunication companies, attackers can access to mobile phone users’ call data records. “Based on the data available to us, Operation Soft Cell has been active since at least 2012, though some evidence suggests even earlier activity by the threat actor against telecommunications providers.

article thumbnail

Experts warn of China-linked APT’s Raptor Train IoT Botnet

Security Affairs

and Taiwan across various sectors, including military, government, higher education, telecommunications, defense industrial base, and IT.” “This botnet has targeted entities in the U.S. ” concludes the report.

IoT 136