The Covert Operator's Playbook: Infiltration of Global Telecom Networks
The Covert Operator's Playbook: Infiltration of Global Telecom Networks

unit42.paloaltonetworks.com
The Covert Operator's Playbook: Infiltration of Global Telecom Networks

Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. The post The Covert Operator's Playbook: Infiltration of Global Telecom Networks appeared first on Unit 42.