Facebook Pixel Invisible occupation of telecom networks by APT actors | Voice and Data - business - Lisez cet article sur Magzter.com

Essayer OR - Gratuit

Invisible occupation of telecom networks by APT actors

Voice and Data

|

July 2025

Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.

- BY DAVID SEHYEON BAEK

Invisible occupation of telecom networks by APT actors

A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.

Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.

In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.

BPFDOOR AND THE CASE OF SK TELECOM

One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.

PLUS D'HISTOIRES DE Voice and Data

Voice and Data

Voice and Data

The flight deck layer for autonomous AI networks

As AI networks act autonomously, embedded observability is evolving into a governing layer that orchestrates telemetry, policy and real-time corrective action.

time to read

3 mins

February 2026

Voice and Data

Voice and Data

"Shopfloor change is now driven by data and intelligent networks"

India's factory floors are no longer defined only by machines, throughput, and shift rosters.

time to read

7 mins

February 2026

Voice and Data

Voice and Data

DIGITAL TRANSFORMATION HITS BUDGET REALITY

As spending tightens, CIOs are cutting sprawl and proving value fast—turning cloud, networks, and platforms into disciplined systems built to perform.

time to read

10 mins

February 2026

Voice and Data

Voice and Data

Securing the digital stack at the silicon core

As Al and hyperscale infrastructure expand, trust must be engineered into semiconductors-the foundational layer powering networks and cloud.

time to read

3 mins

February 2026

Voice and Data

Voice and Data

China builds Meteor 1 parallel optical Al chip

A new photonic processor signals a shift in high-performance computing for Al and data centres amid rising power demands.

time to read

1 mins

February 2026

Voice and Data

Voice and Data

Intelligent fibre for distributed Al ecosystems

As Al workloads stretch across hyperscale, edge, and GPU clusters, ultra-low- loss fibre and automation now define network performance and resilience.

time to read

4 mins

February 2026

Voice and Data

Voice and Data

APP-LAYER FRAUD: IT IS TIME FOR A STRONGER TRUST ARCHITECTURE

With scams increasingly originating on messaging platforms, India must correct regulatory asymmetry and strengthen verification to protect digital trust.

time to read

5 mins

February 2026

Voice and Data

Voice and Data

Beyond the 5G rollout, the age of execution

Industry leaders at the V&D 5G+ Conference debate how India can turn network scale into resilient, intelligent systems that deliver economic value.

time to read

12 mins

February 2026

Voice and Data

Voice and Data

Building real-time risk engines on telco networks

BFSI firms are redesigning risk systems using AI, blockchain, and low-latency networks to enable real-time fraud prevention and compliance.

time to read

4 mins

February 2026

Voice and Data

Voice and Data

Five signals for India's digital infrastructure shift

Nirmala Sitharaman outlines India's Al- and data-centre-led roadmap, signalling structural shifts in networks, compute and digital sovereignty.

time to read

6 mins

February 2026

Listen

Translate

Share

-
+

Change font size