Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Breach Asian Telecom Operators Using Advanced Tools
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Breach Asian Telecom Operators Using Advanced Tools

Highlights

  • Attackers breached multiple Asian telecom operators since at least 2021.

  • Backdoors deployed by Chinese groups included Coolclient, Quickheal, and Rainy Day.

  • Motives include intelligence gathering and potential infrastructure disruption.

Samantha Reed
Last updated: 20 June, 2024 - 3:16 pm 3:16 pm
Samantha Reed 11 months ago
Share
SHARE

An extensive espionage campaign targeting telecom operators in an Asian country has been ongoing since at least 2021. Attackers have used sophisticated tools linked to Chinese hacking groups, raising concerns about the security of critical telecom infrastructure. To gain deeper insights into the breach, refer to the detailed report published by Symantec.

Contents
Targets and TacticsTools and TechniquesUncertainty and Motives

Targets and Tactics

The attackers installed backdoors on the networks of targeted companies and attempted to steal credentials. Symantec’s analysis reveals that the primary targets were telecom companies, a telecom services firm, and a university in another Asian country. The campaign utilized various custom malware, including Coolclient, Quickheal, and Rainy Day, each associated with different Chinese espionage groups.

Tools and Techniques

Coolclient, deployed by the Fireant group (known as Mustang Panda), is designed to log keystrokes, manipulate files, and communicate with a command and control server. Quickheal, linked to the Needleminer group (also known as RedFoxtrot), communicates with a hardcoded command and control server over a custom protocol disguised as SSL traffic. Rainy Day, used by the Firefly group (also known as Naikon), typically executes through a loader that decrypts payloads from external files.

In addition to these backdoors, the attackers employed keylogging malware, port scanning tools, credential dumping techniques, and the Responder tool for LLMNR/NBT-NS/mDNS poisoning. These methods facilitated Remote Desktop Protocol (RDP) access on compromised systems. The tools utilized indicate strong links to multiple Chinese espionage groups.

Uncertainty and Motives

Whether this campaign involves multiple actors operating independently, a single actor using shared tools and personnel, or a collaborative effort remains unclear. The ultimate motive behind these attacks is also uncertain. Potential objectives may include intelligence gathering on the telecom sector, eavesdropping, or establishing a disruptive capability against the country’s critical infrastructure.

Comparing this information with previously published reports, it’s evident that Chinese state-sponsored hacking groups have consistently targeted sensitive industries like telecommunications. Earlier instances of similar espionage activities have also shown the deployment of sophisticated malware and advanced threat techniques to breach and maintain long-term access to targeted systems.

Previous incidents have demonstrated that these attacks are not isolated events but part of a broader strategy to infiltrate and exploit critical sectors. The use of identical or near-identical malware variants in different campaigns indicates a level of persistence and resourcefulness among these groups, suggesting well-coordinated efforts to maintain access and gather intelligence.

The espionage campaign underscores the persistent threat posed by Chinese state-sponsored hacking against key industries. Organizations are strongly advised to enhance their monitoring for signs of compromise and ensure robust defenses to protect against these sophisticated espionage campaigns. Advanced threat detection, regular security assessments, and staff training on cybersecurity best practices are essential measures to safeguard sensitive data and infrastructure.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Hunt Researchers Expose Tools Targeting Taiwanese Infrastructure
Next Article Google Enhances Chrome on iOS with Customization Features

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Elon Musk Shares Tesla Optimus Dance Video
Electric Vehicle
North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?