Chinese Hacker Group APT41 Harvesting SMS Messages from Inside 4 Telcos

3
0

Security firm Fireye says a “highly advanced” Chinese Advanced Persistent Threat dubbed APT41 is using its intrusions into telecommunications companies to to monitor SMS traffic for specific users and keywords using a previously unseen malware type – with high-ranking military and government officials the primary target.

APT41 is using a new espionage tool that FireEye calls MESSAGETAP. It discovered the malware within a cluster of Linux servers during a 2019 investigation at a telco network provider. The servers were being used to route SMS messages or store them until the recipient comes online (so-called SMSC

To see the full content, share this page by clicking one of the buttons below
0
Click on a tab to select how you'd like to leave your comment

Leave A Reply

Your email address will not be published.