A Global Cyber-Attack Was Detected And China Could Be Behind It
Viswamitra Jayavant - Jul 07, 2019
Cybereason - a security company detected a massive, global cyber-attack targeting telecom companies that may have revealed personal information of users.
- How 30 Lines Of Code Destroy A 27-Ton Generator
- Chinese Hackers Conducted 40,000 Cyber Attacks On India In Just 5 Days
- Hackers Tried To Break Into WHO, Are They Trying To Stop Us From Fighting COVID-19?
While we were all obliviously surfing the Internet and going about with our lives, a massive and coordinated cyber attack occurred on a worldwide scale. At least ten global telcos were hit by the attack that caused the loss or damage of users’ personal information, call logs and other private data.
China Probably Sponsored The Attack
The attack was detected first by the security company Cybereason, and the company has also taken upon itself to investigate the matter. Speaking to the news, the Cybereason revealed that the attack could have started in as early as 2012 and as much as 20 victims were targeted. Although the company would not share publicly the names of the companies affected by the attack since everything is still under investigation, they did mention that there is a high probability that China is behind the sophisticated cyber-attack.

Continuous Surveillance
The chief goal of the attack seems to be long-term, continuous surveillance of users worldwide by continuously tracking the location of people’s devices in real-time. The hackers also have access to people’s cell activities. While they could have known when, where, and who the affected user called, fortunately, they would not know the content of the conversation according to Cybereason.
Amit Serper - the head of security for Cybereason stated that the hackers conducted the attack by targeting vulnerabilities in telecom companies’ infrastructure. By exploiting weaknesses in their servers, the hackers could easily gain access to companies’ internal networks and do their business.

And the result of the entire operation is that a whole company’s system is compromised.
Or simply put, as Serper told the press: “Everything is completely owned.”
Featured Stories
Features - Jul 01, 2025
What Are The Fastest Passenger Vehicles Ever Created?
Features - Jun 25, 2025
Japan Hydrogen Breakthrough: Scientists Crack the Clean Energy Code with...
ICT News - Jun 25, 2025
AI Intimidation Tactics: CEOs Turn Flawed Technology Into Employee Fear Machine
Review - Jun 25, 2025
Windows 11 Problems: Is Microsoft's "Best" OS Actually Getting Worse?
Features - Jun 22, 2025
Telegram Founder Pavel Durov Plans to Split $14 Billion Fortune Among 106 Children
ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...
Features - Jun 21, 2025
This Over $100 Bottle Has Nothing But Fresh Air Inside
Features - Jun 18, 2025
Best Mobile VPN Apps for Gaming 2025: Complete Guide
Features - Jun 18, 2025
A Math Formula Tells Us How Long Everything Will Live
Features - Jun 16, 2025

Comments
Sort by Newest | Popular