Attackers target Telecommunications sector to gain network access

Threat Advisories

Attackers target Telecommunications sector to gain network access

Threat Level
Attack Report

For a detailed threat advisory, download the pdf file here

Summary

To gain initial access, the adversary used social engineering to impersonate IT, staff, using phone calls, SMS, and/or Telegram. When the adversary gains access to the target environment, it performs constant activity within that environment.