КућаБезбедносне операцијеSingtel targeted by Chinese hackers in a test run for attacks on...

Singtel targeted by Chinese hackers in a test run for attacks on US targets

Објављено на

spot_img

Singtel, one of Asia’s largest telecommunications providers, reportedly fell victim to a breach by the infamous Chinese cyber-espionage threat actor, Volt Typhoon, last summer. According to Bloomberg, sources familiar with the matter revealed that hackers affiliated with Volt Typhoon used a webshell to infiltrate Singtel’s network. Despite these claims, Singtel has not officially confirmed the breach, opting instead to emphasize its commitment to network resilience and cybersecurity measures.

In response to the allegations, Singtel stated, “We understand the importance of network resilience, especially because we are a key infrastructure service provider. That’s why we adopt industry best practices and work with industry-leading security partners to continuously monitor and promptly address the threats that we face on a daily basis.” The company also mentioned its ongoing efforts to enhance its cybersecurity capabilities to safeguard critical assets from evolving threats.

Interestingly, the breach of Singtel by Volt Typhoon was not driven by a desire to obtain sensitive information from the telecommunications giant. Rather, it was allegedly a practice run for the group’s ultimate goal of launching cyberattacks against US telecommunications companies. This revelation aligns with previous warnings issued by US security agencies in early 2024, which highlighted Volt Typhoon’s long-standing presence on the networks of critical US infrastructure firms, facilitated by tactics such as living off the land (LOTL) and exploitation of stolen accounts.

Despite mounting evidence linking Volt Typhoon to state-sponsored cyber espionage activities, the Chinese government has vehemently denied any allegations of wrongdoing. In a surprising twist, China published a paper in October 2024 claiming that Volt Typhoon was actually a US asset, challenging the narrative put forth by US authorities. The Chinese government referenced the viewpoints of unspecified cybersecurity experts to support its claims, further complicating the already murky waters of state-sponsored cyber warfare.

Headquartered in Singapore, Singtel plays a pivotal role in providing telecommunications services across the Asia-Pacific region. With a diverse portfolio encompassing mobile, broadband, and fixed-line services, the company is a significant player in the telecommunications industry. The breach by Volt Typhoon serves as a stark reminder of the evolving threat landscape faced by organizations, underscoring the need for robust cybersecurity defenses and proactive risk management practices.

As the implications of the breach continue to unfold, the cybersecurity community remains vigilant in monitoring and addressing potential threats posed by state-sponsored threat actors like Volt Typhoon. The incident underscores the importance of collaboration between industry stakeholders, government agencies, and cybersecurity experts to bolster defenses and mitigate the impact of sophisticated cyberattacks on critical infrastructure. Singtel’s experience with the breach serves as a cautionary tale for organizations worldwide, highlighting the persistent and evolving nature of cyber threats in an increasingly interconnected digital landscape.

Извор линк

Најновији чланци

The FBI seeks public assistance in locating Chinese hackers

The US Federal Bureau of Investigation (FBI) has reached out to the public for...

Google addresses two Android zero-day vulnerabilities exploited in targeted attacks

In the latest security update released by Google in November, the tech giant has...

Skynet Botnet, Controlled by LameDuck, Initiates Over 35,000 DDoS Attacks

Cybersecurity researchers at Cloudflare's Cloudforce One recently identified that LameDuck’s Skynet Botnet conducted more...

Double-check if your last bill with DocuSign was legitimate

In a recent phishing campaign, threat actors have been exploiting the APIs of legitimate...

Више овако

The FBI seeks public assistance in locating Chinese hackers

The US Federal Bureau of Investigation (FBI) has reached out to the public for...

Google addresses two Android zero-day vulnerabilities exploited in targeted attacks

In the latest security update released by Google in November, the tech giant has...

Skynet Botnet, Controlled by LameDuck, Initiates Over 35,000 DDoS Attacks

Cybersecurity researchers at Cloudflare's Cloudforce One recently identified that LameDuck’s Skynet Botnet conducted more...
sr_RSSerbian