Prøve GULL - Gratis

Invisible occupation of telecom networks by APT actors

Voice and Data

|

July 2025

Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.

- BY DAVID SEHYEON BAEK

Invisible occupation of telecom networks by APT actors

A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.

Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.

In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.

BPFDOOR AND THE CASE OF SK TELECOM

One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.

FLERE HISTORIER FRA Voice and Data

Voice and Data

Voice and Data

India's silent AI revolution: Infra fuels the new digital core

As India's digital ambition meets reality, enterprises are quietly turning to robust AI infrastructure as the backbone of strategic transformation.

time to read

8 mins

August 2025

Voice and Data

Voice and Data

NISAR soars: Indo-US ‘golden mesh’ to track Earth’s pulse from orbit

The NASA-ISRO radar satellite will map Earth's dynamic changes with centimetre-level accuracy for climate, agriculture, and disaster resilience.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

The dark side of AI: ChatGPT's dreaded twin

WormGPT exposes how Al's powerful capabilities are being weaponised, making cybercrime more scalable, persuasive, and dangerously accessible.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

India’s mobile export rise marks global manufacturing shift

India mobile phone export growth signals a broader transformation, as domestic value chains expand and jobs rise in a maturing manufacturing ecosystem.

time to read

2 mins

August 2025

Voice and Data

Voice and Data

"The government is backing risk-now industry must lead"

As Secretary of the Department of Science & Technology, Dr Abhay Karandikar is shaping India's innovation agenda at a defining moment.

time to read

6 mins

August 2025

Voice and Data

Voice and Data

"The future of home Wi-Fi is about smarter, Al-driven networks"

From jitter and latency to interference, spoofed devices, and jamming, WiFi is venturing far beyond its traditional bounds.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

When machine learns from books: What Indian law must fix

India's first AI copyright case tests how far the law can stretch to keep up with machine learning, global precedents, and the idea of transformative use.

time to read

5 mins

August 2025

Voice and Data

Voice and Data

Quantum-proofing telecom networks before the storm hits

As quantum threats edge closer, telecom networks must act now to defend sensitive data with hybrid cryptography and quantum-safe strategies.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

India Q2 tech investment dips; digital infra, communication hold fort

India’s tech sector recorded 60 deals worth USD 460 M in AMJ 2025, marking a steep fall in value, while communication, infra, quantum, and space held firm.

time to read

4 mins

August 2025

Voice and Data

Akash Prime hits high-altitude mark with indigenous RF seeker

India successfully tests upgraded Akash Prime system with indigenously developed RF seeker, bolstering high-altitude air defence capabilities.

time to read

1 mins

August 2025

Listen

Translate

Share

-
+

Change font size