APT Threats in Telecommunications

Comprehensive database of Advanced Persistent Threats targeting telco companies

This table provides information about known Advanced Persistent Threats (APTs) that have targeted telecommunications companies around the world.

NameOriginTargetsTechniquesImpactSeverityLast ActivityMitigationReport
APT10 (Stone Panda)ChinaGlobal telcos, IT service providersSpear-phishing, custom malware, credential theftIntellectual property theft, network infiltration
High
2023-03Implement strong email filters, regular security awareness training, and robust network segmentation.View
Fancy Bear (APT28)RussiaEuropean and US telcos, government agenciesZero-day exploits, malware implants, social engineeringEspionage, data exfiltration, infrastructure sabotage
Critical
2023-06Maintain up-to-date patch management, implement application whitelisting, and use multi-factor authentication.View
Lazarus GroupNorth KoreaGlobal telcos, financial institutionsWatering hole attacks, ransomware, supply chain compromisesFinancial fraud, data theft, service disruption
High
2023-05Implement robust supply chain security measures, regular security assessments, and comprehensive incident response plans.View
MuddyWater (SeedWorm)IranMiddle Eastern telcos, government entitiesMacro-enabled documents, PowerShell scripts, backdoorsEspionage, data exfiltration, strategic intelligence gathering
Medium
2023-02Disable macros by default, implement application control policies, and use endpoint detection and response (EDR) solutions.View
Winnti GroupChinaAsian telcos, high-tech companiesSupply chain attacks, rootkits, digitally signed malwareIntellectual property theft, long-term network persistence
High
2023-04Implement strict code signing policies, conduct regular integrity checks on software, and deploy advanced malware detection systems.View
Equation GroupUnited States (alleged)Global telcos, ISPs, critical infrastructureFirmware exploitation, advanced malware, zero-day vulnerabilitiesIntelligence gathering, covert surveillance, infrastructure control
Critical
2022-12Implement strict firmware update policies, conduct regular firmware integrity checks, and deploy network behavior analysis tools.View
Dragonfly (Energetic Bear)RussiaEnergy sector telcos, industrial control systemsTrojanized software updates, watering hole attacks, spear-phishingSabotage potential, espionage, long-term access to critical systems
High
2023-01Implement air-gapped networks for critical systems, conduct regular security audits, and deploy industrial control system (ICS) specific security solutions.View
Sofacy (Pawn Storm)RussiaGlobal telcos, defense contractors, mediaPhishing campaigns, zero-day exploits, malware toolsetsGeopolitical intelligence gathering, data theft, disinformation potential
High
2023-05Implement robust email security measures, conduct regular phishing simulations, and deploy advanced threat protection solutions.View
APT41 (Winnti Umbrella)ChinaGlobal telcos, gaming industry, healthcareSupply chain attacks, spear-phishing, custom malwareIntellectual property theft, financial fraud, espionage
Critical
2023-06Implement robust supply chain risk management, deploy advanced endpoint protection, and conduct regular threat hunting exercises.View
Turla (Snake)RussiaEuropean and Middle Eastern telcos, government agenciesSatellite communication hijacking, complex malware ecosystemsLong-term intelligence gathering, covert communication channels
High
2023-03Implement secure satellite communication protocols, deploy advanced network traffic analysis tools, and conduct regular security assessments of communication infrastructure.View
APT29 (Cozy Bear)RussiaWestern telcos, government agencies, think tanksSophisticated social engineering, custom malware, stealth tacticsEspionage, data exfiltration, long-term persistence
Critical
2023-07Implement advanced threat detection systems, conduct regular security awareness training, and deploy robust network segmentation.View
Charming Kitten (APT35)IranTelcos in Middle East, Europe, and North AmericaPhishing, social engineering, fake personasIntelligence gathering, credential theft, surveillance
Medium
2023-05Implement strong multi-factor authentication, conduct regular phishing awareness training, and deploy advanced email filtering solutions.View
Sandworm TeamRussiaUkrainian telcos, energy sector, government agenciesDestructive malware, supply chain attacks, zero-day exploitsInfrastructure disruption, data destruction, geopolitical leverage
Critical
2023-06Implement robust backup and recovery systems, conduct regular vulnerability assessments, and deploy advanced threat hunting capabilities.View
Gallium (Soft Cell)ChinaGlobal telecommunications providersLiving off the land, custom malware, long-term persistenceCall detail record theft, network mapping, strategic intelligence gathering
High
2023-04Implement strict access controls, conduct regular threat hunting exercises, and deploy advanced network monitoring solutions.View
KimsukyNorth KoreaSouth Korean telcos, government agencies, think tanksSpear-phishing, watering hole attacks, malware implantsEspionage, data theft, geopolitical intelligence gathering
Medium
2023-03Implement robust email security measures, conduct regular security awareness training, and deploy advanced endpoint protection solutions.View
APT32 (OceanLotus)VietnamSoutheast Asian telcos, media, automotive industrySpear-phishing, custom malware, supply chain attacksIntellectual property theft, competitive intelligence gathering
High
2023-05Implement robust supply chain security measures, deploy advanced malware detection systems, and conduct regular security assessments.View
MacheteUnknown (Spanish-speaking)Latin American telcos, government agencies, embassiesTargeted phishing, custom malware, social engineeringEspionage, data exfiltration, geopolitical intelligence gathering
Medium
2023-02Implement strong email filtering, conduct regular security awareness training, and deploy endpoint detection and response (EDR) solutions.View
ThripChinaSatellite communications, telecommunications, geospatial imagingLiving off the land, custom malware, long-term persistenceEspionage, strategic intelligence gathering, potential sabotage
High
2023-06Implement strict access controls, conduct regular threat hunting exercises, and deploy advanced network segmentation.View
Volatile Cedar (Lebanese Cedar)LebanonTelcos in Middle East, defense contractors, utilitiesCustom malware (Explosive), web server exploitationEspionage, data exfiltration, long-term persistence
Medium
2023-04Implement robust web application security measures, conduct regular vulnerability assessments, and deploy advanced threat detection systems.View
Inception FrameworkUnknownTelcos in Europe, Russia, and Central AsiaSpear-phishing, mobile malware, custom implantsEspionage, data theft, strategic intelligence gathering
High
2023-03Implement mobile device management (MDM) solutions, conduct regular security awareness training, and deploy advanced email security measures.View
Naikon APTChinaSoutheast Asian telcos, government agencies, military organizationsSpear-phishing, custom backdoors, lateral movementGeopolitical espionage, data exfiltration, long-term network access
High
2023-07Implement robust network segmentation, deploy advanced threat detection systems, and conduct regular security awareness training for employees.View
DarkhotelSouth Korea (suspected)Business executives, telco infrastructure in AsiaHotel Wi-Fi exploitation, zero-day vulnerabilities, targeted malwareCorporate espionage, data theft, strategic intelligence gathering
High
2023-05Implement secure travel protocols for executives, use VPNs on public Wi-Fi, and deploy advanced endpoint protection on mobile devices.View
ReginFive Eyes intelligence alliance (suspected)Telco backbones, government institutions, research facilitiesModular malware, sophisticated stealth mechanisms, GSM base station targetingLong-term intelligence gathering, telco infrastructure compromise
Critical
2023-06Implement advanced network monitoring solutions, conduct regular security audits of telco infrastructure, and deploy robust encryption for all communications.View
AxiomChinaGlobal telcos, aerospace, energy, and defense industriesSpear-phishing, custom malware suites, data exfiltration toolsIntellectual property theft, strategic intelligence gathering, long-term persistence
High
2023-04Implement robust data loss prevention (DLP) solutions, conduct regular threat hunting exercises, and deploy advanced endpoint detection and response (EDR) tools.View
Careto (The Mask)Spanish-speaking countryTelcos, government institutions, energy companiesHighly sophisticated malware, rootkit capabilities, multi-platform attacksEspionage, data theft, geopolitical intelligence gathering
High
2023-03Implement advanced anti-malware solutions, conduct regular system integrity checks, and deploy robust network behavior analysis tools.View