Malicious Hackers Became Domain Admins in Giant Telco Cyberattack
… someone trying to make it look like APT10.”
There’s nothing the average consumer or organization can do to defend themselves short of making drastic changes to their mobile use patterns, he said.
For the mobile providers, defense comes down to visibility into the network and greater network control and segmentation.
“I was surprised at the extent and the length of the campaign as reported,” said Erlin. “I mean, it’s a long time for this type of activity go undiscovered or unanalyzed.”
Lazarovitz points to the lateral movement that allowed the attackers to get from desktop computers to servers holding personal information.
“There should be another hop here into a more sensitive and secure network,” he pointed out.
Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role, he focuses on product and technology coverage for the publication. In addition, he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and other conferences.