Cyble-US-Telecom-Companies-Cyberattacks
The Telecommunications sector is part of the critical infrastructure of any nation, as the backbone for communications and coordination. According to Kepios’ research, the number of internet users in 2023 will stand at 311.3 million, with an internet penetration rate of 91.8% of the total population. This presents a growing lucrative threat attack surface for threat actors, ransomware, and APT (Advanced Persistent Threat) groups.
Since January, Cyble Research and Intelligence Labs have observed that hackers have targeted several U.S. telecommunications companies.
Most of the breaches mentioned above can be attributed to third-party vendors. Third-party breaches through vendors, software, and MSPs (Managed Service Providers) caused several prominent incidents, including the Okta breach in March 2022, the Kaseya hack in July 2021, and most recently, the leak of 77,000 Uber employees’ data through its third-party vendor Teqtivity.
These third-party breaches can lead to a larger scale supply-chain attacks and a greater number of impacted users and entities globally. Typically, Scammers often take the leaked information, compile it with information from other breaches or publicly accessible sources, and attempt identity theft, financial fraud, extortion, or harassment. This was seen after the Optus data breach, where a sample of 10,000 records shared by the T.A. was used in an attempt to extort the users.
Companies’ post-breach response typically includes contracting auditors and information security companies as well as offering short-term credit monitoring to protect against fraud. However, these are reactive measures. Ideally, GRC (Governance, Risk, and Compliance) should direct companies to maintain adequate policies and procedures to protect against threats proactively. These include:
In response to the breaches in the Telecommunications sector, on January 5, 2023, the FCC issued a statement pushing for a change in current breach notification guidelines, proposing the removal of the compulsory seven-day waiting period before customers are notified of breaches, as well as expanding the scope of federal agencies that receive breach notifications to include the FCC, FBI, and the U.S. Secret Service.
“The law requires carriers to protect sensitive consumer information, but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules to protect consumers and strengthen reporting requirements.”
FCC Chairwoman Jessica Rosenworcel
https://docs.fcc.gov/public/attachments/DOC-390568A1.pdf
https://www.sec.gov/ix?doc=/Archives/edgar/data/0001283699/000119312523010949/d641142d8k.htm
https://thecyberexpress.com/verizon-customer-data-for-sale-on-dark-web/
https://thecyberexpress.com/data-breach-uscellular-user-info-sale-dark-web/
https://www.reuters.com/technology/us-stops-provision-licences-export-chinas-huawei-ft-2023-01-30/
https://www.securityweek.com/australian-man-sentenced-for-scam-related-to-optus-hack/
https://datareportal.com/reports/digital-2023-united-states-of-america
https://therecord.media/telecom-giant-charter-communications-says-third-party-vendor-had-security-breach/
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2019/how-to-approach-mitigating-third-party-risk
2025 may be remembered as the year that hacktivist attacks became significantly more dangerous.
The threat landscape shifted significantly in 2025. Here are the threats and trends to watch…
Cyble analyzed deVixor, an advanced Android banking RAT with ransomware features actively targeting Iranian users.
The year may be a little more than a week old, but threat actors have…
Cyble’s 2025 report analyzes Initial Access sales, ransomware operations, and data breaches shaping the cyber…
A critical authentication bypass flaw, CVE-2025-13915, affects IBM API Connect. Singapore issues alert as IBM…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.