Active Defense & Deception , Critical Infrastructure Security , Next-Generation Technologies & Secure Development

Operation Soft Cell

Understanding the implications of this massive attack on telecommunications providers with Assaf Dahan, Sr. Director, Threat Research Lead at Cybereason.

In 2018, the Cybereason Research team identified a series of attacks targeting telecommunications companies. These attacks shared the same TTPs and consisted of a webshell execution followed by the deployment of Poison Ivy, a well-known RAT attributed to Chinese APT groups.

We have identified that this same threat actor has been operating in these telecommunications providers environments for at least two years. We performed a retrospective analysis of the attacks and were able to see changes in the attack patterns, along with new activity every quarter.

In this webinar, you will learn about:

  • A global, nation state-backed campaign against multiple telecommunications providers that has been underway for years.
  • How attackers completely took over the IT network and were able to customize the IT infrastructure for their convenience, complete with their own VPN inside of the network.
  • How attacking telcos has become an attack on critical infrastructure.
  • What information attackers were able to gain access to, and how they can use it.

Join Assaf Dahan, Sr. Director, Threat Research Lead at Cybereason, to learn about this huge attack on telecommunications providers here first. Register for our webinar today.


About the Author




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.