試す - 無料

Invisible occupation of telecom networks by APT actors

Voice and Data

|

July 2025

Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.

- BY DAVID SEHYEON BAEK

Invisible occupation of telecom networks by APT actors

A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.

Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.

In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.

BPFDOOR AND THE CASE OF SK TELECOM

One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.

Voice and Data からのその他のストーリー

Voice and Data

Voice and Data

Rebuilding enterprise DNA with AI-ready platforms

SAP is rebuilding enterprise foundations with AI-ready data fabrics and secure automation frameworks to create a scalable, intelligent infrastructure.

time to read

5 mins

November 2025

Voice and Data

Voice and Data

SECURING THE 5G ENGINE FOR A SAFER DIGITAL WORLD

India's 5G revolution demands a defence-first mindset as cyber threats escalate, making trust, resilience and Zero Trust security essential for a digital economy.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Get smarter SOCs in the age of intelligent threats

Al-powered SOCs are transforming security, combining automation and intelligence to enhance detection, response, and cyber resilience across the industry.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Building the nation's long-term digital spine

India needs a future-proof fibre backbone to deliver reliable, scalable, and mission-critical connectivity for a Viksit Bharat through 2047 and beyond.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Are telcos ready to let AI take the wheel?

AI is reshaping how networks run, decisions are made, and customer experiences evolve-pushing telcos to prepare for an era where intelligence drives the core.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

IGNITING A NEW ORBIT FOR SPACE RESEARCH

From mission design to Earth observation, HPC is now the hidden engine accelerating simulations, autonomy, and discovery across global space science.

time to read

10 mins

November 2025

Voice and Data

Glasgow scientists develop AI model to decode protein talk

PLM-interact decodes how proteins communicate, predicting interactions and mutations to speed up disease and virus research.

time to read

1 mins

November 2025

Voice and Data

GPS spoofing at IGIA: A wake-up call for national security

The disruption at Indira Gandhi International Airport (IGIA), where more than 800 flights were delayed or diverted following an alleged GPS-spoofing incident, is a wake-up call for India's aviation and communication systems.

time to read

2 mins

November 2025

Voice and Data

Voice and Data

The wireless foundation of neo-industrial growth

India's next phase of growth will be shaped by secure, scalable wireless platforms that unify connectivity, strengthen security, and accelerate innovation.

time to read

2 mins

November 2025

Voice and Data

Voice and Data

Scalable, secure, fast: The Cloud CDN advantage

Cloud-based CDNs are redefining digital performance, delivering speed, security, and scalability at the edge for a seamless user experience.

time to read

4 mins

November 2025

Listen

Translate

Share

-
+

Change font size