Gå ubegrenset med Magzter GOLD

Gå ubegrenset med Magzter GOLD

Få ubegrenset tilgang til over 9000 magasiner, aviser og premiumhistorier for bare

$149.99
 
$74.99/År

Prøve GULL - Gratis

Invisible occupation of telecom networks by APT actors

Voice and Data

|

July 2025

Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.

- BY DAVID SEHYEON BAEK

Invisible occupation of telecom networks by APT actors

A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.

Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.

In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.

BPFDOOR AND THE CASE OF SK TELECOM

One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.

FLERE HISTORIER FRA Voice and Data

Voice and Data

Voice and Data

Reimagining Earth through a living digital twin

A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Telcos find new lifeline in spectrum slicing

As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Rethinking enterprise connectivity with managed Wi-Fi

As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Beyond VPN: Building trust into network access

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Banking on richer, safer digital conversations

RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Powering India's cloud with sustainable data hubs

India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.

time to read

5 mins

October 2025

Voice and Data

Voice and Data

Made in India: Building the backbone of loT hardware

From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Breaking data barriers with light

Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Cyber defence redefined as firewalls give way to foresight

Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Connecting the currents of digital finance

India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.

time to read

5 mins

October 2025

Listen

Translate

Share

-
+

Change font size