LightBasin Hackers Breach at Least 13 Telecom Service Providers Since 2019

Cyber Security

Products You May Like

A highly sophisticated adversary named LightBasin has been identified as behind a string of attacks targeting the telecom sector with the goal of collecting “highly specific information” from mobile communication infrastructure, such as subscriber information and call metadata.

“The nature of the data targeted by the actor aligns with information likely to be of significant interest to signals intelligence organizations,” researchers from cybersecurity firm CrowdStrike said in an analysis published Tuesday.

Known to be active as far back as 2016, LightBasin (aka UNC1945) is believed to have compromised 13 telecommunication companies across the world since 2019 by leveraging custom tools and their extensive knowledge of telecommunications protocols for scything through organizations’ defenses. The identities of the targeted entities were not disclosed, nor did the findings link the cluster’s activity to a specific country.

Automatic GitHub Backups

Indeed, a recent incident investigated by CrowdStrike found the targeted intrusion actor taking advantage of external DNS (eDNS) servers to connect directly to and from other compromised telecom companies’ GPRS networks via SSH and through previously established backdoors such as PingPong. The initial compromise is facilitated with the help of password-spraying attacks, consequently leading to the installation of SLAPSTICK malware to steal passwords and pivot to other systems in the network.

Other indications based on telemetry data show the targeted intrusion actor’s ability to emulate GPRS network access points so as to perform command-and-control communications in conjunction with a Unix-based backdoor called TinyShell, thereby enabling the attacker to tunnel traffic through the telecommunications network.

Among the multiple tools in LightBasin’s malware arsenal is a network scanning and packet capture utility called “CordScan” that allows the operators to fingerprint mobile devices, as well as “SIGTRANslator,” an ELF binary that can transmit and receive data via the SIGTRAN protocol suite, which is used to carry public switched telephone network (PSTN) signaling over IP networks.

Enterprise Password Management

“It is not surprising that servers would need to communicate with one another as part of roaming agreements between telecommunications companies; however, LightBasin’s ability to pivot between multiple telecommunications companies stems from permitting all traffic between these organizations without identifying the protocols that are actually required,” CrowdStrike noted.

“As such, the key recommendation here is for any telecommunications company to ensure that firewalls responsible for the GPRS network have rules in place to restrict network traffic to only those protocols that are expected, such as DNS or GTP,” the company added.

The findings also come just as cybersecurity firm Symantec disclosed details of a previously unseen advanced persistent threat (APT) group dubbed “Harvester,” which has been linked to an information-stealing campaign aimed at telecommunications, government, and information technology sectors in South Asia since June 2021 using a custom implant called “Graphon.”

Products You May Like

Articles You May Like

Infinix Note 40S 4G Specifications, Design Confirmed via Company’s Website Ahead of Launch
Lava Blaze X India Launch Teased; Live Images of a Lava Blaze Model Leaked
Supreme Court punts social media moderation cases back to lower courts
Samsung Galaxy M35 5G India Launch Teased, Might Go on Sale During Amazon Prime Day
WhatsApp Now Lets Users Create Events in Group Chats on iPhone with Latest Update

Leave a Reply

Your email address will not be published. Required fields are marked *