An ambitious group of suspected state-backed hackers has been burrowing into telecoms to spy on high-profile targets across the world, a US cybersecurity firm said in a report published on Tuesday.
Boston-based Cybereason said the tactic gave hackers sweeping access to the targets’ call records, location data and device information — effectively turning the targets’ telecom against them.
Because customers were not directly targeted, they might never discover that their every movement was being monitored by a hostile power, Cybereason chief executive Lior Div said.
The hackers have turned the affected telecoms into “a global surveillance system,” Div said in a telephone interview. “Those individuals don’t know they were hacked — because they weren’t.”
Div, who presented his findings at the Cyber Week conference in Tel Aviv, Israel, provided scant details about who was targeted in the hack.
Cybereason had been called in to help an unidentified telecom last year and discovered that the hackers had broken into the firm’s billing server, where call records are logged, he said.
The hackers were using their access to extract the data of “around 20” customers, Div said.
Who those people were he declined to say, describing them as mainly coming from the worlds of politics and the military.
He said the information was so sensitive that he would not provide even the vaguest idea of where they or the telecom were located.
“I’m not even going to share the continent,” he said.
Cybereason said the compromise of its customer eventually led it to about 10 other firms that had been hit in a similar way, with hackers stealing data in 100 gigabyte chunks.
Div said that, in some cases, the hackers even appeared to be tracking non-phone devices, such as vehicles or smartwatches.
Cybereason said that it was in the process of briefing some of the world’s largest telecoms on the development.
The GSM Association, a group that represents mobile operators worldwide, said in an e-mail that it was monitoring the situation.
Who might be behind such hacking campaigns is often a fraught question in a world full of digital false flags.
Cybereason said all the signs pointed to APT10 — the nickname often applied to a notorious cyberespionage group that US authorities and digital security experts have tied to the Chinese government, but Div said that the clues they found were so obvious that he and his team sometimes wondered whether they might have been left on purpose.
“I thought: ‘Hey, just a second, maybe it’s somebody who wants to blame APT10,’” he said.
Chinese authorities routinely deny responsibility for hacking operations. The Chinese embassy in London did not immediately return a request seeking comment.
Div said that it was unclear whether the ultimate targets of the espionage operation were warned, saying that Cybereason had left it to the telecom to notify its customers.
Div added that he had been in touch with “a handful” of law enforcement agencies about the matter, although he did not say which ones.
The US government has signed defense cooperation agreements with Japan and the Philippines to boost the deterrence capabilities of countries in the first island chain, a report by the National Security Bureau (NSB) showed. The main countries on the first island chain include the two nations and Taiwan. The bureau is to present the report at a meeting of the legislature’s Foreign Affairs and National Defense Committee tomorrow. The US military has deployed Typhon missile systems to Japan’s Yamaguchi Prefecture and Zambales province in the Philippines during their joint military exercises. It has also installed NMESIS anti-ship systems in Japan’s Okinawa
‘WIN-WIN’: The Philippines, and central and eastern European countries are important potential drone cooperation partners, Minister of Foreign Affairs Lin Chia-lung said Minister of Foreign Affairs Lin Chia-lung (林佳龍) in an interview published yesterday confirmed that there are joint ventures between Taiwan and Poland in the drone industry. Lin made the remark in an exclusive interview with the Chinese-language Liberty Times (the Taipei Times’ sister paper). The government-backed Taiwan Excellence Drone International Business Opportunities Alliance and the Polish Chamber of Unmanned Systems on Wednesday last week signed a memorandum of understanding in Poland to develop a “non-China” supply chain for drones and work together on key technologies. Asked if Taiwan prioritized Poland among central and eastern European countries in drone collaboration, Lin
The Chien Feng IV (勁蜂, Mighty Hornet) loitering munition is on track to enter flight tests next month in connection with potential adoption by Taiwanese and US armed forces, a government source said yesterday. The kamikaze drone, which boasts a range of 1,000km, debuted at the Taipei Aerospace and Defense Technology Exhibition in September, the official said on condition of anonymity. The Chungshan Institute of Science and Technology and US-based Kratos Defense jointly developed the platform by leveraging the engine and airframe of the latter’s MQM-178 Firejet target drone, they said. The uncrewed aerial vehicle is designed to utilize an artificial intelligence computer
Renewed border fighting between Thailand and Cambodia showed no signs of abating yesterday, leaving hundreds of thousands of displaced people in both countries living in strained conditions as more flooded into temporary shelters. Reporters on the Thai side of the border heard sounds of outgoing, indirect fire yesterday. About 400,000 people have been evacuated from affected areas in Thailand and about 700 schools closed while fighting was ongoing in four border provinces, said Thai Rear Admiral Surasant Kongsiri, a spokesman for the military. Cambodia evacuated more than 127,000 villagers and closed hundreds of schools, the Thai Ministry of Defense said. Thailand’s military announced that