Poging GOUD - Vrij
Invisible occupation of telecom networks by APT actors
Voice and Data
|July 2025
Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.
A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.
Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.
In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.
BPFDOOR AND THE CASE OF SK TELECOM
One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.
Dit verhaal komt uit de July 2025-editie van Voice and Data.
Abonneer u op Magzter GOLD voor toegang tot duizenden zorgvuldig samengestelde premiumverhalen en meer dan 9000 tijdschriften en kranten.
Bent u al abonnee? Aanmelden
MEER VERHALEN VAN Voice and Data
Voice and Data
The flight deck layer for autonomous AI networks
As AI networks act autonomously, embedded observability is evolving into a governing layer that orchestrates telemetry, policy and real-time corrective action.
3 mins
February 2026
Voice and Data
"Shopfloor change is now driven by data and intelligent networks"
India's factory floors are no longer defined only by machines, throughput, and shift rosters.
7 mins
February 2026
Voice and Data
DIGITAL TRANSFORMATION HITS BUDGET REALITY
As spending tightens, CIOs are cutting sprawl and proving value fast—turning cloud, networks, and platforms into disciplined systems built to perform.
10 mins
February 2026
Voice and Data
Securing the digital stack at the silicon core
As Al and hyperscale infrastructure expand, trust must be engineered into semiconductors-the foundational layer powering networks and cloud.
3 mins
February 2026
Voice and Data
China builds Meteor 1 parallel optical Al chip
A new photonic processor signals a shift in high-performance computing for Al and data centres amid rising power demands.
1 mins
February 2026
Voice and Data
Intelligent fibre for distributed Al ecosystems
As Al workloads stretch across hyperscale, edge, and GPU clusters, ultra-low- loss fibre and automation now define network performance and resilience.
4 mins
February 2026
Voice and Data
APP-LAYER FRAUD: IT IS TIME FOR A STRONGER TRUST ARCHITECTURE
With scams increasingly originating on messaging platforms, India must correct regulatory asymmetry and strengthen verification to protect digital trust.
5 mins
February 2026
Voice and Data
Beyond the 5G rollout, the age of execution
Industry leaders at the V&D 5G+ Conference debate how India can turn network scale into resilient, intelligent systems that deliver economic value.
12 mins
February 2026
Voice and Data
Building real-time risk engines on telco networks
BFSI firms are redesigning risk systems using AI, blockchain, and low-latency networks to enable real-time fraud prevention and compliance.
4 mins
February 2026
Voice and Data
Five signals for India's digital infrastructure shift
Nirmala Sitharaman outlines India's Al- and data-centre-led roadmap, signalling structural shifts in networks, compute and digital sovereignty.
6 mins
February 2026
Listen
Translate
Change font size
