Category

Telecommunications

Telecommunications Page 2

Mantis Botnet Powerful Botnet Malware DDoS Cybersecurity Cyberattack

Mantis botnet described as the most powerful botnet to date

A new botnet, dubbed Mantis, that security researchers spotted last June was said to have performed a record-breaking DDoS (distributed denial-of-service) attack against its targets, being described as one of the most powerful botnet variants. From the reports about the Mantis botnet, its attacks had topped at 26 million HTTPS requests per second, coming from...
Continue Reading
French Telecommunication Europe Ransomware Cyberattack Lockbit Ransomware Cybercrime

A French telecommunication company got hit by a ransomware attack

A France-based telecommunication service called La Poste Mobile has issued a threat advisory regarding a recent ransomware attack. Based on the report, the ransomware attack targeted the telco company’s administrative and management systems earlier this month. Some researchers claimed that the LockBit ransomware group orchestrated the campaign. Fortunately, the company’s security was quick on its...
Continue Reading
PingPull Malware Gallium Threat Group Cyberattacks Chinese Hackers

New PingPull malware used by Gallium threat group for their attacks

A Chinese-speaking advanced persistent threat group called Gallium has been discovered utilising a newfound remote access trojan, PingPull malware, for its cyber-espionage campaigns. The group is known for attacking different industries in Europe, Africa, and Southeast Asia (SEA). The PingPull malware is a very challenging backdoor for researchers to detect since it uses the Internet...
Continue Reading
Lyceum APT DNS Backdoor Telecom Energy Sectors Middle East Hijacking

Lyceum APT uses a DNS backdoor to hit the telecom and energy sectors

A state-backed APT group from Iran, Lyceum, has been utilising [.]NET-based DNS backdoor in targeting firms from the telecom and energy industries. Also known by their other names, Hexane and Spilrin, the Lyceum APT group had a history of attacking communication service companies from the Middle East through DNS-tunneling backdoors. From an analyst’s recent study...
Continue Reading
Threat Advisory Warning Cyberespionage Cyberattacks Chinese Hackers Threat Actors CISA NSA FBI Hacker Group

Firms are warned about cyberespionage attacks done by Chinese actors

Chinese-based cybercriminals are currently rampaging to target organisations with cyberespionage attacks – a report that several federal law enforcement agencies have warned about. CISA, NSA, and FBI recently released a joint advisory regarding the rising rate of Chinese threat groups attacking several sectors worldwide, including the most targeted telecommunications industry.   According to the released...
Continue Reading
TCP Middlebox Reflection Cyberattacks IP Exploit DDoS

TCP Middlebox Reflection attacks can exploit millions of IPs

The TCP Middlebox Reflection method is a new amplification technique for conducting a Distributed Denial-of-Service attack. Researchers stated that this type of attack is a massive emerging threat that can infect many organisations. Moreover, the new attack abused flawed firewalls and content filtering systems to reflect and increase the TCP traffic in their target’s devices....
Continue Reading
Moshen Dragon Cyberespionage Hacker Gang Telco Central Asia Chinese Hackers

Moshen Dragon cyberespionage gang hits telcos from Central Asia

Telecom service providers from Central Asia are the newest targets of a China-based cyberespionage group dubbed Moshen Dragon after cybersecurity experts detected new waves of malicious activities from them. Security researchers found some common grounds between Moshen Dragon and other threat groups like Nomad Panda and RedFoxtrot since they have all utilised similar malware variants...
Continue Reading
Android Devices Mobile Phone RCE Remote Code Execution Unpatched Apple Codec Vulnerability

Android devices at risk of RCE due to unpatched Apple codec

Several Android gadgets operating on Qualcomm and MediaTek chipsets were at risk against remote code execution (RCE) after security experts found vulnerabilities in the Apple Lossless Audio Codec (ALAC) implementation. Apple Lossless Audio Codec or ALAC is a tool provided by Apple, an audio coding format for lossless audio compression, made available in 2011. Since...
Continue Reading
Botnets DDoS Cyberattacks Enemybot Fodcha Vulnerability Exploit IoT Devices

Two new botnets joined the fray in conducting DDoS attacks

The Enemybot and the Fodcha botnets have been trying to compromise numerous targets globally by abusing multiple flaws in routers, modems, and Internet of Things (IoT) devices. These two newly discovered botnets can perform distributed denial-of-service attacks on any location. Enemybot and Fodcha are the newest addition to the long lists of botnets that will...
Continue Reading
T-Mobile SMiShing Cyberattacks Phishing Warning Advisory NJCCIC

Experts warn T-Mobile users against rampant SMiShing attacks

Several T-Mobile customers have recently filed reports about being targeted by a new SMS-phishing (SMiShing) campaign that attacks the victims with malicious links using unblockable texts via bulk or group sent messages. The public warning advisory was released by the New Jersey Cybersecurity & Communications Integration Cell (NJCCIC), an organisation that focuses on cybersecurity incident...
Continue Reading
1 2 3 4 7