APT Threats in Telecommunications
Comprehensive database of Advanced Persistent Threats targeting telco companies
This table provides information about known Advanced Persistent Threats (APTs) that have targeted telecommunications companies around the world.
Name | Origin | Targets | Techniques | Impact | Severity | Last Activity | Mitigation | Report |
---|---|---|---|---|---|---|---|---|
APT10 (Stone Panda) | China | Global telcos, IT service providers | Spear-phishing, custom malware, credential theft | Intellectual property theft, network infiltration | High | 2023-03 | Implement strong email filters, regular security awareness training, and robust network segmentation. | View |
Fancy Bear (APT28) | Russia | European and US telcos, government agencies | Zero-day exploits, malware implants, social engineering | Espionage, data exfiltration, infrastructure sabotage | Critical | 2023-06 | Maintain up-to-date patch management, implement application whitelisting, and use multi-factor authentication. | View |
Lazarus Group | North Korea | Global telcos, financial institutions | Watering hole attacks, ransomware, supply chain compromises | Financial fraud, data theft, service disruption | High | 2023-05 | Implement robust supply chain security measures, regular security assessments, and comprehensive incident response plans. | View |
MuddyWater (SeedWorm) | Iran | Middle Eastern telcos, government entities | Macro-enabled documents, PowerShell scripts, backdoors | Espionage, data exfiltration, strategic intelligence gathering | Medium | 2023-02 | Disable macros by default, implement application control policies, and use endpoint detection and response (EDR) solutions. | View |
Winnti Group | China | Asian telcos, high-tech companies | Supply chain attacks, rootkits, digitally signed malware | Intellectual property theft, long-term network persistence | High | 2023-04 | Implement strict code signing policies, conduct regular integrity checks on software, and deploy advanced malware detection systems. | View |
Equation Group | United States (alleged) | Global telcos, ISPs, critical infrastructure | Firmware exploitation, advanced malware, zero-day vulnerabilities | Intelligence gathering, covert surveillance, infrastructure control | Critical | 2022-12 | Implement strict firmware update policies, conduct regular firmware integrity checks, and deploy network behavior analysis tools. | View |
Dragonfly (Energetic Bear) | Russia | Energy sector telcos, industrial control systems | Trojanized software updates, watering hole attacks, spear-phishing | Sabotage potential, espionage, long-term access to critical systems | High | 2023-01 | Implement air-gapped networks for critical systems, conduct regular security audits, and deploy industrial control system (ICS) specific security solutions. | View |
Sofacy (Pawn Storm) | Russia | Global telcos, defense contractors, media | Phishing campaigns, zero-day exploits, malware toolsets | Geopolitical intelligence gathering, data theft, disinformation potential | High | 2023-05 | Implement robust email security measures, conduct regular phishing simulations, and deploy advanced threat protection solutions. | View |
APT41 (Winnti Umbrella) | China | Global telcos, gaming industry, healthcare | Supply chain attacks, spear-phishing, custom malware | Intellectual property theft, financial fraud, espionage | Critical | 2023-06 | Implement robust supply chain risk management, deploy advanced endpoint protection, and conduct regular threat hunting exercises. | View |
Turla (Snake) | Russia | European and Middle Eastern telcos, government agencies | Satellite communication hijacking, complex malware ecosystems | Long-term intelligence gathering, covert communication channels | High | 2023-03 | Implement secure satellite communication protocols, deploy advanced network traffic analysis tools, and conduct regular security assessments of communication infrastructure. | View |
APT29 (Cozy Bear) | Russia | Western telcos, government agencies, think tanks | Sophisticated social engineering, custom malware, stealth tactics | Espionage, data exfiltration, long-term persistence | Critical | 2023-07 | Implement advanced threat detection systems, conduct regular security awareness training, and deploy robust network segmentation. | View |
Charming Kitten (APT35) | Iran | Telcos in Middle East, Europe, and North America | Phishing, social engineering, fake personas | Intelligence gathering, credential theft, surveillance | Medium | 2023-05 | Implement strong multi-factor authentication, conduct regular phishing awareness training, and deploy advanced email filtering solutions. | View |
Sandworm Team | Russia | Ukrainian telcos, energy sector, government agencies | Destructive malware, supply chain attacks, zero-day exploits | Infrastructure disruption, data destruction, geopolitical leverage | Critical | 2023-06 | Implement robust backup and recovery systems, conduct regular vulnerability assessments, and deploy advanced threat hunting capabilities. | View |
Gallium (Soft Cell) | China | Global telecommunications providers | Living off the land, custom malware, long-term persistence | Call detail record theft, network mapping, strategic intelligence gathering | High | 2023-04 | Implement strict access controls, conduct regular threat hunting exercises, and deploy advanced network monitoring solutions. | View |
Kimsuky | North Korea | South Korean telcos, government agencies, think tanks | Spear-phishing, watering hole attacks, malware implants | Espionage, data theft, geopolitical intelligence gathering | Medium | 2023-03 | Implement robust email security measures, conduct regular security awareness training, and deploy advanced endpoint protection solutions. | View |
APT32 (OceanLotus) | Vietnam | Southeast Asian telcos, media, automotive industry | Spear-phishing, custom malware, supply chain attacks | Intellectual property theft, competitive intelligence gathering | High | 2023-05 | Implement robust supply chain security measures, deploy advanced malware detection systems, and conduct regular security assessments. | View |
Machete | Unknown (Spanish-speaking) | Latin American telcos, government agencies, embassies | Targeted phishing, custom malware, social engineering | Espionage, data exfiltration, geopolitical intelligence gathering | Medium | 2023-02 | Implement strong email filtering, conduct regular security awareness training, and deploy endpoint detection and response (EDR) solutions. | View |
Thrip | China | Satellite communications, telecommunications, geospatial imaging | Living off the land, custom malware, long-term persistence | Espionage, strategic intelligence gathering, potential sabotage | High | 2023-06 | Implement strict access controls, conduct regular threat hunting exercises, and deploy advanced network segmentation. | View |
Volatile Cedar (Lebanese Cedar) | Lebanon | Telcos in Middle East, defense contractors, utilities | Custom malware (Explosive), web server exploitation | Espionage, data exfiltration, long-term persistence | Medium | 2023-04 | Implement robust web application security measures, conduct regular vulnerability assessments, and deploy advanced threat detection systems. | View |
Inception Framework | Unknown | Telcos in Europe, Russia, and Central Asia | Spear-phishing, mobile malware, custom implants | Espionage, data theft, strategic intelligence gathering | High | 2023-03 | Implement mobile device management (MDM) solutions, conduct regular security awareness training, and deploy advanced email security measures. | View |
Naikon APT | China | Southeast Asian telcos, government agencies, military organizations | Spear-phishing, custom backdoors, lateral movement | Geopolitical espionage, data exfiltration, long-term network access | High | 2023-07 | Implement robust network segmentation, deploy advanced threat detection systems, and conduct regular security awareness training for employees. | View |
Darkhotel | South Korea (suspected) | Business executives, telco infrastructure in Asia | Hotel Wi-Fi exploitation, zero-day vulnerabilities, targeted malware | Corporate espionage, data theft, strategic intelligence gathering | High | 2023-05 | Implement secure travel protocols for executives, use VPNs on public Wi-Fi, and deploy advanced endpoint protection on mobile devices. | View |
Regin | Five Eyes intelligence alliance (suspected) | Telco backbones, government institutions, research facilities | Modular malware, sophisticated stealth mechanisms, GSM base station targeting | Long-term intelligence gathering, telco infrastructure compromise | Critical | 2023-06 | Implement advanced network monitoring solutions, conduct regular security audits of telco infrastructure, and deploy robust encryption for all communications. | View |
Axiom | China | Global telcos, aerospace, energy, and defense industries | Spear-phishing, custom malware suites, data exfiltration tools | Intellectual property theft, strategic intelligence gathering, long-term persistence | High | 2023-04 | Implement robust data loss prevention (DLP) solutions, conduct regular threat hunting exercises, and deploy advanced endpoint detection and response (EDR) tools. | View |
Careto (The Mask) | Spanish-speaking country | Telcos, government institutions, energy companies | Highly sophisticated malware, rootkit capabilities, multi-platform attacks | Espionage, data theft, geopolitical intelligence gathering | High | 2023-03 | Implement advanced anti-malware solutions, conduct regular system integrity checks, and deploy robust network behavior analysis tools. | View |