Man
Professional
- Messages
- 3,038
- Reaction score
- 561
- Points
- 113
Singapore Telecom has become a test site for preparing to hack critical infrastructure.
In the summer, cyberspies from the Volt Typhoon group, backed by the Chinese government, hacked the telecommunications company Singtel in Singapore. Bloomberg sources said that the incident took place in June and that this hack could be a "test" before attacks on telecommunications companies in the United States.
Authorities in the United States and other countries have already warned that the Volt Typhoon has hacked into the networks of critical facilities in America and other countries. Experts believe that the group may be preparing for cyberattacks that can cause damage or cause large-scale disruptions. Volt Typhoon's goals include telecommunications, energy, transportation, and water and sanitation systems.
Authorities in the United States, Canada, the United Kingdom, Australia and New Zealand have said that Volt Typhoon's actions go beyond ordinary espionage. According to countries, cyberspies are preparing to gain access to operational technologies (OT) that control the operation of critical infrastructures.
In October, information also appeared about the Salt Typhoon group, which also allegedly acts at the behest of the Chinese government. Salt Typhoon reportedly hacked the telecommunications networks of Verizon, AT&T and Lumen Technologies in the United States. However, none of the companies commented on the information about the attacks. Salt Typhoon also tried to gain access to smartphones associated with teams of US presidential candidates from both parties.
China denies involvement in the cyberattacks and says the Volt Typhoon does not exist at all. Singtel declined to comment in detail, but said it takes cyber threats seriously and works with leading security experts to protect its networks.
According to Bloomberg, Volt Typhoon used a web shell to infiltrate Singtel's systems. This method is similar to the actions we wrote about in August. At that time, Volt Typhoon exploited a vulnerability in Versa's SD-WAN hardware to inject special code that collects user data. Experts are confident that such attacks continue against networks that have not yet installed security updates.
Source
In the summer, cyberspies from the Volt Typhoon group, backed by the Chinese government, hacked the telecommunications company Singtel in Singapore. Bloomberg sources said that the incident took place in June and that this hack could be a "test" before attacks on telecommunications companies in the United States.
Authorities in the United States and other countries have already warned that the Volt Typhoon has hacked into the networks of critical facilities in America and other countries. Experts believe that the group may be preparing for cyberattacks that can cause damage or cause large-scale disruptions. Volt Typhoon's goals include telecommunications, energy, transportation, and water and sanitation systems.
Authorities in the United States, Canada, the United Kingdom, Australia and New Zealand have said that Volt Typhoon's actions go beyond ordinary espionage. According to countries, cyberspies are preparing to gain access to operational technologies (OT) that control the operation of critical infrastructures.
In October, information also appeared about the Salt Typhoon group, which also allegedly acts at the behest of the Chinese government. Salt Typhoon reportedly hacked the telecommunications networks of Verizon, AT&T and Lumen Technologies in the United States. However, none of the companies commented on the information about the attacks. Salt Typhoon also tried to gain access to smartphones associated with teams of US presidential candidates from both parties.
China denies involvement in the cyberattacks and says the Volt Typhoon does not exist at all. Singtel declined to comment in detail, but said it takes cyber threats seriously and works with leading security experts to protect its networks.
According to Bloomberg, Volt Typhoon used a web shell to infiltrate Singtel's systems. This method is similar to the actions we wrote about in August. At that time, Volt Typhoon exploited a vulnerability in Versa's SD-WAN hardware to inject special code that collects user data. Experts are confident that such attacks continue against networks that have not yet installed security updates.
Source