A threat actor using tools and techniques associated with APT10, the Chinese hacking group, and aimed at global cellular telecommunications providers completely took over at least one provider’s network in its efforts to obtain data on very specific, high-value targets, according to a report from the Cybereason Nocturnus team.
Operation Soft Cell, active since at least 2017, launched multiwave attacks on targets and after taking over the IT network, tailored the infrastructure to suit its needs, even “brazenly” inserting its own VPN within the network, Amit Serper, head of security research for Cybereason Nocturnus, told SC Media.
As a result of the initiative, the hackers tapped the active directory for all the data stored there and compromised all of the telecommunication provider’s username and password information as well as PII such as credential, billing data, call detail records, email servers and user geolocation users.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.