Denemek ALTIN - Özgür
Invisible occupation of telecom networks by APT actors
Voice and Data
|July 2025
Stealthy cyber intrusions are infiltrating telecom systems deeply, raising concerns about infrastructure control, resilience, and national security.
A new phase of cyber conflict is emerging— one that does not involve loud attacks or immediate destruction, but quiet infiltration and long-term presence. Across continents, telecom operators are being targeted by advanced persistent threat (APT) groups aligned with state interests. These are not random hacks driven by financial motives, but part of broader strategic efforts to silently embed within critical communications infrastructure, especially in telecommunications.
Rather than deploying easily detectable malware, many of these operations employ techniques that utilise legitimate system tools and processes to maintain control without raising suspicion. This approach, often referred to as “Living off the Land” (LOTL), enables attackers to blend in with normal operations, evade detection, and remain undetected within systems for years. In some cases, there is no obvious breach indicator—no unfamiliar files, no malicious processes—just an adversary who has become part of the system.
In a post-malware era, attackers no longer need to plant code—they utilise what is already in the system, thereby becoming indistinguishable from legitimate users.
BPFDOOR AND THE CASE OF SK TELECOM
One recent case that has drawn attention is the intrusion at South Korea's largest mobile network operator, SK Telecom (SKT). According to official investigations, SKT was compromised by a Linux-targeting malware known as BPFDoor, believed to be linked to China-aligned threat actors. The malware is notable not only for its technical design but for its apparent ability to remain hidden for extended periods, possibly infiltrating SKT’s systems as early as 2021. While SKT itself is not the centre of global concern, the case is a concrete example of how APT actors operate: not to make headlines, but to establish quiet, persistent access.
Bu hikaye Voice and Data dergisinin July 2025 baskısından alınmıştır.
Binlerce özenle seçilmiş premium hikayeye ve 9.000'den fazla dergi ve gazeteye erişmek için Magzter GOLD'a abone olun.
Zaten abone misiniz? Oturum aç
Voice and Data'den DAHA FAZLA HİKAYE
Voice and Data
Digital infrastructure shifts from scale to trust
AI-scale compute, multi-agent automation, domain LLMs, and sovereign cloud shifts are redefining digital infrastructure—with trust and risk at the core.
4 mins
January 2026
Voice and Data
5G FWA growth drives a modest wireless subscriber uptick
TRAI's November 2025 data shows wireless growth led by Jio and Airtel, as 5G FWA expands and Vi and MTNL continue to lose users.
3 mins
January 2026
Voice and Data
Security goes autonomous: Al agents, twins, AR wearables
Agentic Al, digital twins, and AR wearables are moving from pilots to operations, reshaping how Indian security teams detect, decide, and act.
6 mins
January 2026
Voice and Data
The thinking network: Making every node count
AI agents and cloud-led orchestration will transform enterprise networks into intelligent systems that act, predict, and optimise before issues arise.
3 mins
January 2026
Voice and Data
From dumb pipes to intelligent telecom platforms
As consumer monetisation plateaus, telcos are shifting from pipes to programmable networks–selling APIs, trust, and outcomes as software platforms.
9 mins
January 2026
Voice and Data
Can the techco pivot drive Reliance Jio's USD 170 B bid?
Reliance Jio IPO will test whether telecom can be valued as a platform, with Al and scale of media reshaping industry multiples and investor appetite.
6 mins
January 2026
Voice and Data
Semicon PLI could de-risk India's digital infrastructure build
As India scales 5G, fibre, edge, and data centres, Semicon India aims to improve component supply, lead times, and cost stability for equipment.
4 mins
January 2026
Voice and Data
Cloud-native workflows are shrinking enterprise latency
Event-driven cloud, microservices, and iPaaS orchestration are moving context with the asset-enabling real-time approvals, compliance, and execution.
4 mins
January 2026
Voice and Data
From threats to trust: How Al secures digital growth
As cyber threats evolve, Al is helping Indian D2C and B2C businesses turn digital vulnerabilities into resilience, trust, and sustained growth.
2 mins
January 2026
Voice and Data
Laser nanowire films promise EMI shielding for 6G devices
Glasgow researchers create transparent, flexible silver nanowire films that cut EMI across 2.2-6 GHz, enabling denser radios in future devices.
3 mins
January 2026
Listen
Translate
Change font size

