Science

Hackers steal years of data from 10 global cell networks in suspected Chinese espionage campaign


Hackers have stolen years of data on ‘specific individuals’ from 10 global cell networks in suspected Chinese espionage campaign, investigation finds

  • Researchers say that 10 global cell networks were breach by Chinese hackers
  • Hackers were able to steal billing data, call records, credentials and more 
  • In all there were 20 targets that may include politicians and spies
  • The hack was large enough to parlay into a widespread attack on cell networks 

In a sophisticated breach of nearly a dozen global cell networks, researchers say hackers with connections to China were able to obtain sensitive call information on at least 20 targets. 

The hackers — as detailed by security firm Cybereason and first reported by TechCrunch — were able to scoop up a wealth of information from their efforts including ‘billing data, call detail records, credentials, email servers, geo-location of users’ throughout the past seven years. 

That gamut of data, despite not containing actual recordings of calls, would prove particularly useful in tracking the activity and agenda of politicians, spies, law enforcement, and foreign agents, according to Cybereason who discovered the breach last year. 

Data gathering efforts took place throughout the last seven years and was able to breach at least 10 global cell networks across the globe.

Data gathering efforts took place throughout the last seven years and was able to breach at least 10 global cell networks across the globe. 

‘Having this information becomes particularly valuable when nation-state threat actors are targeting foreign intelligence agents, politicians, opposition candidates in an election, or even law enforcement,’ reads the report. 

According to CNBC, Cybereason has yet to identify the specific companies affected by the breach, but attacks reportedly showed an increased focus on telecommunications in Western Europe.

A China-affiliated state-actor called APT10 is likely behind behind the efforts, researchers say, citing the advanced tools and sophistication of the hack.  

Lending to the hacks success throughout the last seven years were the methods used in the attack.

State actors, likely from China, were behind the effort according to Cybereason, which uncovered the breach last year.

State actors, likely from China, were behind the effort according to Cybereason, which uncovered the breach last year. 

WHO IS APT10? 

Also known as: Menupass Team

Suspected attribution: China

Target sectors: Construction and engineering, aerospace, and telecom firms, and governments in the United States, Europe, and Japan

Overview: APT10 is a Chinese cyber espionage group. They have historically targeted construction and engineering, aerospace, and telecom firms, and governments in the United States, Europe, and Japan. 

Targeting of these industries is believe to have been in support of Chinese national security goals, including acquiring valuable military and intelligence information as well as the theft of confidential business data to support Chinese corporations. 

– FireEye Security 

Instead of hacking the individual phone of their target’s the group was able to camp out in the cell networks and scrape data at will. 

Given the amount of access gained by hackers, researchers warn that the group could have potentially parlayed their breach into a more malicious and widespread cyberattack on affected cell networks. 

‘Any entity that possesses the power to take over the networks of telecommunications providers can potentially leverage its unlawful access and control of the network to shut down or disrupt an entire cellular network as part of a larger cyber warfare operation,’ reads the report. 

News of the attack comes at a time when tensions between the U.S. and China continue to worsen amid rising trade tensions.

Last year, the U.S. Justice Department indicted two Chinese hackers for breaching dozens of tech companies in America. 



READ SOURCE

Leave a Reply

This website uses cookies. By continuing to use this site, you accept our use of cookies.