Thursday, January 30, 2025
HomeCyber AttackChinese Hackers Attacking Telecommunications Industry to Steal 5G Secrets

Chinese Hackers Attacking Telecommunications Industry to Steal 5G Secrets

Published on

SIEM as a Service

Follow Us on Google News

The threat actors from China are now targeting the telecommunications organizations of Southeast Asia, Germany, Europe, the United States, India, and Vietnam.

The main motive of the Chines threat actors is to steal 5G secrets and data of the organizations. This attack was detected by the cybersecurity researchers at the U.S.-based security firm McAfee.

This campaign has considered having targeted at least 23 telecommunications companies. And the group behind the campaign is entitled “Operation Dianxun.”

After a proper investigation, the cybersecurity analyst came to know that the group has many other names, it is also known as “Mustang Panda” and “RedDelta.”

This group has a long history of hacking and surveillance campaigns targeting organizations throughout the world, and now this group is focusing on compromising telecom providers.

However, the initial means of attack is not yet been recognized, but, it’s known that victims are pointed towards a malicious phishing domain that is under the control of the attackers that are utilized to deliver malware to sufferers.

The Defensive Architecture

Now the question arises that how architecture defense itself? Well to defend itself from this kind of attack, it needs different methods and tactics, and that must have potential impact.

According to the experts, it’s quite necessary to have a multi-layer strategy and interpret various steps. By doing all these one can understand the best way to deal with them one by one along with a multicultural security architecture. 

Moreover, McAfee’s Security Architecture has provided some methods and tactics that will help an organization protect against the tactics and techniques that are used in Operation Dianxun.

But, here, the primary motto is to shift-left and block or recognize a threat immediately within the Kill Chain, simply to restrict any further damage.

The researchers also affirmed that shifting-left starts with MVISION Insights, and it actively consolidates intelligence on the threat and presents all the details on the indicators of settlement and the MITRE methods used in the attack. 

Research & Threat Detection with MVISION EDR

The McAfee Web Gateway and MVISON Unified Cloud Edge can easily stop the primary entry vector. While the Endpoint Protection Platform can have the ability to block the dropper performance or confuse the malicious activities.

But all these can be performed only by using MVISION EDR, that’s why the MVISION EDR has the threat detection on the monitoring dashboard for two separate stages and means of the attack.

So, to halt such targeted threat campaigns like Operation Dianxun, victims must build an adaptive and combined security architecture that will surely make it more difficult for hackers to gain and increase flexibility in the business.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...