Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers [www.cybereason.com]
A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata [www.wired.com]
A hacker assault left mobile carriers open to network shutdown [www.cnet.com]
"Massive scale" intrusion into mobile carriers' networks exposed customers' location, call data for years [boingboing.net]
Hackers infiltrate global telecom companies in large-scale espionage attack, research firm says [www.fiercewireless.com]
Hackers stole data from cell service providers worldwide, report says [www.businessinsider.com]
U.S. Blacklisting Huawei justified as Chinese Hackers found gathering info on Individuals, Governments & more globally [www.patentlyapple.com]
Attacks on global telecoms companies point to Chinese hackers [www.techspot.com]
Hackers Have Targeted Phone Networks in Prolonged Cyberattack [www.digitaltrends.com]
Security firm says 'high degree of certainty' China linked to global hack of telcos [www.houstonchronicle.com]
Hackers have reportedly been stealing call records from a dozen global carriers for years [www.androidcentral.com]
A new report says China's APT10 hackers were likely behind the infiltration of ~10 global telecom companies last yr. Same group indicted by DoJ in Dec https://t.co/kdERmTXGWx w/ @timothywmartin
— Eva Dou (@evadou) June 25, 2019
Unknown hackers using techniques associated with a Chinese group have been targeting telecom companies and trying to steal call records, GPS data, and more, according to @cybereason: https://t.co/cUQXPG1IGE
— Eric Geller (@ericgeller) June 25, 2019
WSJ says 10 carriers, 20 China-linked targets: https://t.co/59VRkQb8QG
i would be more unnerved by this if 99% of my call records wasn’t spam https://t.co/7fcSI0TJpl
— dr. talia jane (@itsa_talia) June 25, 2019
Good lord. Researchers have said they’ve uncovered a ‘massive espionage operation’. 7 years of data hacked from 10 mobile phone networks. If you’re part of it, it would pretty much tell them where you were every minute of the day. Likely a state of coursehttps://t.co/WOaVyVKZGd
— Carl Miller (@carljackmiller) June 25, 2019
"the hackers could track the physical location of any customer of the hacked telcos — including spies and politicians"
— Eric Neustadter (e) (@thevowel) June 25, 2019
This is fine. https://t.co/useEYfmXRv
New: Security researchers say they've found a "massive-scale" espionage operation of hackers breaking into at least 10 cell networks around the world and stealing hundreds of gigabytes of call records at a time. https://t.co/vkAwUSFaQA
— Zack Whittaker (@zackwhittaker) June 25, 2019
...and the more technical blog post by Cybereason: https://t.co/RJClUzbXol
— Timo Steffens (@Timo_Steffens) June 25, 2019
FWIW, the attribution to APT10 is basically based on TTPs, which are in this case rather generic and would fit several other Chinese groups with known similar targeting profiles, too. *justsaying*
Before everybody goes crazy, read the line: “Cybereason said it has not yet seen the hackers target North American providers” https://t.co/HAwPP6fuko
— Ben Goerz (@bengoerz) June 25, 2019
Hackers backed by #China targeted 20 people across Asia, Europe, Africa & the Middle East by infiltrating cell network of 10 global carriers. Imagine how much easier it will be for them to do this when carrier’s cell network built with #Huawei equipment. https://t.co/MArFUIRsyw
— Marco Rubio (@marcorubio) June 25, 2019
Worried that your phone might be hacked to track your location, who you call and when? One cyberespionage group has just provided a reminder that hackers don't necessarily even need to reach out to your device to gain that kind of access. https://t.co/xKf1nO0gQ6
— WIRED (@WIRED) June 25, 2019
9 months of detective work, RE, threat Intel dumpster diving, report writing, and a ton of YARA. The technical blog post is up - thanks so much for the many people who worked with me on this @MoominTrollster @jtrombley90 and many more - you all rock.https://t.co/BIyYcTzk1b
— Amit Serper (@0xAmit) June 25, 2019
...and the more technical blog post by Cybereason: https://t.co/RJClUzbXol
— Timo Steffens (@Timo_Steffens) June 25, 2019
FWIW, the attribution to APT10 is basically based on TTPs, which are in this case rather generic and would fit several other Chinese groups with known similar targeting profiles, too. *justsaying*
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers https://t.co/oDGkuH5dRj
— netbiosX (@netbiosX) June 25, 2019
(Thread) Some notes on @Cybereason's threat research, covered widely in the news today, on APT10 (Chinese MSS) attacks on telecommunications (1/13) https://t.co/bYnH7yEpMI
— Wesley McGrew (@McGrewSecurity) June 25, 2019
A nice report by @0xAmit @cybereason on ?? #APT targeting telecoms / mobile carriers.
— Tal Be'ery (@TalBeerySec) June 25, 2019
All the usual suspects: webshell, Lateral movement with stolen credentials / hashes, #mimikatz, etc.https://t.co/nc1fTDh2lA#apt10
Cybereason researchers uncover Operation Soft Cell, in which a threat actor stole CDRs from global telecommunications providers https://t.co/5r7obYlnuq
— Virus Bulletin (@virusbtn) June 25, 2019
This research will also be presented at #VB2019 in London https://t.co/TFKewhyYgK pic.twitter.com/WEsxbUCK0S
#cyberespionage campaign against telco providers to steal cell call logs, tower locations, etc. #APT10 Chinese threat actor #cybersecurity #infosec #databreach https://t.co/xAPGr1SYks
— Bob Sipes (@BobSipes) June 25, 2019
You are an attacker. You need to spy on 20 specific individuals & construct a profile on each one of them. What will you do?
— Saad Kadhi (@_saadk) June 25, 2019
Compromise 10 telco providers through vulnerable web services, move laterally and collect phone metadata.
Operation Soft Cellhttps://t.co/4gIrnWOJEJ
A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata https://t.co/mn6p47Cebc pic.twitter.com/2jFZ3uRlff
— ぱんだおじちゃん(ぱんおじ®) (@Panda_Lv6) June 25, 2019
Hackers stole "gigabytes of metadata related to 20 specific individuals' phone usage and location," according to @cybereason. Do they intend to notify the victims? https://t.co/lsQdkGslJE pic.twitter.com/QxjaNBTgzG
— Runa Sandvik (@runasand) June 25, 2019
A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata https://t.co/Yk7XKxOGMR > In one case, they stole the location and call record data of 20 specific individuals
— PrivacyDigest (@PrivacyDigest) June 25, 2019
A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata https://t.co/pPBW0us8rC pic.twitter.com/s5lnfNPRIm
— #AI (@AI__TECH) June 25, 2019
"Massive scale" intrusion into mobile carriers' networks exposed customers' location, call data for yearshttps://t.co/JEFC92F9aq pic.twitter.com/FsF5v1BJ5q
— Masque of the Red Death (@doctorow) June 25, 2019
High degree of certainty that China’s behind a massive hack of more than 10 telcos. https://t.co/Q2DolSSURp
— TechBurger (@HCTechBurger) June 25, 2019
#hackers have reportedly been stealing call records from a dozen global carriers for years https://t.co/n4qSIOl2in
— Secure Cyber (@Sec_Cyber) June 25, 2019
A very very good research by @0xAmit
— SwitHak (@SwitHak) June 25, 2019
Nocturnus Team @cybereason.
This is a solid report on #APT10
Telcos attacks. Thanks Amit, I will watch your webinar the 9th July too.
↘️https://t.co/swHPjjuARQ
Cybereason and our world class Nocturnus research team has been investigating a massive espionsage campaign 'Operation Soft Cell' against global telcos. Read about it today here. https://t.co/sTRzdZBl5W @cybereason
— Lior Div (@liordiv) June 25, 2019
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers https://t.co/WWDvthgvzq
— Nicolas Krassas (@Dinosn) June 25, 2019
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers https://t.co/U8ldaPxhQH via @cybereason
— Allan Liska (@uuallan) June 25, 2019
The Chinese embassy responded to Cybereason's research pointing at APT10 as the hackers likely behind stealing data from mobile carriers: https://t.co/MFkqcqELta pic.twitter.com/MUtB5Vrfgu
— alfred ? (@alfredwkng) June 25, 2019
A very very good research by @0xAmit
— SwitHak (@SwitHak) June 25, 2019
Nocturnus Team @cybereason.
This is a solid report on #APT10
Telcos attacks. Thanks Amit, I will watch your webinar the 9th July too.
↘️https://t.co/swHPjjuARQ
Cybereason and our world class Nocturnus research team has been investigating a massive espionsage campaign 'Operation Soft Cell' against global telcos. Read about it today here. https://t.co/sTRzdZBl5W @cybereason
— Lior Div (@liordiv) June 25, 2019
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers https://t.co/WWDvthgvzq
— Nicolas Krassas (@Dinosn) June 25, 2019
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers https://t.co/U8ldaPxhQH via @cybereason
— Allan Liska (@uuallan) June 25, 2019
The Chinese embassy responded to Cybereason's research pointing at APT10 as the hackers likely behind stealing data from mobile carriers: https://t.co/MFkqcqELta pic.twitter.com/MUtB5Vrfgu
— alfred ? (@alfredwkng) June 25, 2019
A very detailed analysis of #APT10 #cyberespionage campaign dubbed Operation Soft Cell; leverages #IIS China Chopper #webshell. Via @cybereason. #infosec #Cybersecurity #DFIR #cybercrime #malware #CISO #forensics https://t.co/e4rmlaq0xF https://t.co/jmCIGKkwRb
— Brent Muir (@bsmuir) June 26, 2019
APT10 used dynamic DNS C2 domains in Operation Soft Cell (https://t.co/7BTNWIGCNN). Security teams leverage our analytics stack to instantly uncover these groups without indicator lists or threat feeds. Learn more >> https://t.co/RopJ2Smc5D pic.twitter.com/H6IFAbv0KH
— AlphaSOC (@alphasoc) June 25, 2019
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers - Blog https://t.co/bPXNFcReQY via @nuzzel thanks @offethhacker
— alexander knorr (@opexxx) June 26, 2019
Hackers have quietly infiltrated more than a dozen mobile carriers around the world, gaining complete control of networks behind the companies' backs whilst accessing geolocation data, call logs and text message records.#privacy #security https://t.co/Q90wf72PlH
— Stefan Ferreira ?️? (@stefanf28) June 26, 2019