試す 金 - 無料
Invisible occupation of telecom networks by APT actors
Voice and Data
|July 2025
Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.

A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.
Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.
In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.
BPFDOOR AND THE CASE OF SK TELECOM
One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.
このストーリーは、Voice and Data の July 2025 版からのものです。
Magzter GOLD を購読すると、厳選された何千ものプレミアム記事や、10,000 以上の雑誌や新聞にアクセスできます。
すでに購読者ですか? サインイン
Voice and Data からのその他のストーリー

Voice and Data
Reimagining Earth through a living digital twin
A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.
3 mins
October 2025

Voice and Data
Telcos find new lifeline in spectrum slicing
As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.
7 mins
October 2025

Voice and Data
Rethinking enterprise connectivity with managed Wi-Fi
As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.
4 mins
October 2025

Voice and Data
Beyond VPN: Building trust into network access
As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.
4 mins
October 2025

Voice and Data
Banking on richer, safer digital conversations
RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.
3 mins
October 2025

Voice and Data
Powering India's cloud with sustainable data hubs
India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.
5 mins
October 2025

Voice and Data
Made in India: Building the backbone of loT hardware
From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.
4 mins
October 2025

Voice and Data
Breaking data barriers with light
Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.
7 mins
October 2025

Voice and Data
Cyber defence redefined as firewalls give way to foresight
Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.
3 mins
October 2025

Voice and Data
Connecting the currents of digital finance
India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.
5 mins
October 2025
Listen
Translate
Change font size