Attackers target Telecommunications sector to gain network access
Attackers target Telecommunications sector to gain network access
Threat Level
Attack Report
For a detailed threat advisory, download the pdf file here
Summary
To gain initial access, the adversary used social engineering to impersonate IT, staff, using phone calls, SMS, and/or Telegram. When the adversary gains access to the target environment, it performs constant activity within that environment.