Operation Soft Cell

Threat Actor updated 18 hours ago (2024-10-17T13:02:25.023Z)
Download STIX
Preview STIX
Operation Soft Cell, a long-running espionage campaign targeting telecommunications providers, was first uncovered by Cybereason researchers in June 2019. The threat actor behind this operation is likely state-sponsored, with the intrusion set being attributed to a Chinese cyber espionage actor due to tooling overlaps. The operation's primary tactic involves infiltrating a target, gaining a foothold, then moving laterally with the aim of maintaining persistence and extracting data from strategic targets as needed. Notably, some telecommunications companies had been infiltrated for more than five years before the activity was discovered. The Operation Soft Cell campaign has been linked to various other Chinese-aligned hacking efforts focused on telecom targets worldwide, such as those tracked by Microsoft as Gallium, which dates back to at least 2012, and APT41, known for engaging in Chinese-linked cyberespionage as well as financially motivated activity. Despite these links, conclusive attribution remains elusive, according to Sentinel Labs and QGroup researchers. The operation's primary focus has been stealing call data records, demonstrating a specialty in lurking and listening within compromised networks. The ongoing targeting of communication infrastructure through campaigns like Operation Soft Cell should serve as a warning to carriers and service providers to bolster their defenses. This is especially pertinent given that the campaign forms part of a global effort reaching back over a decade, as highlighted by SentinelLabs' analysis of Chinese cyberespionage activity targeting telecommunications entities in the greater Middle East. These activities underscore the persistent and pervasive threat posed by advanced persistent threat (APT) actors to critical communications infrastructure.
Description last updated: 2024-10-17T12:29:32.985Z
What's your take? (Question 1 of 1)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Chinese
Espionage
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.