101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

481
active users

#telecomsecurity

0 posts0 participants0 posts today

🚨 5G Core Vulnerability Exposed – VKB Webinar #1 🚨

Think your 5G Core Network is locked down? Vulnerability #2049 says otherwise. We’re tearing it apart—no fluff, just exclusive intel straight from our Vulnerability Knowledge Base.

📅 March 26 | ⏰ 3:00 PM - 4:00 PM CET
🎙 Alexis Vernet, Telecom Offensive Security Expert
🛡 What’s inside? A deep dive into real-world risks and how to stay ahead of attackers.

🔗 Claim your spot now: app.getcontrast.io/register/p1

🌐 P1 Security at GSMA FASG #30 🌐

P1 Security will be at the GSMA FASG #30 in Sophia Antipolis, France, from November 5th to 7th!

Representing us will be our Founder & CEO, Philippe Langlois, with over 30 years of network security expertise, and Martin Kacer, our Telecom Security Expert Researcher managing GSMA relations.

If you're interested in exploring security solutions for critical mobile infrastructure, discussing the latest in telcosec, or simply connecting, don’t hesitate to reach out. We’d love to meet you!

"⚠️ Telecom Sector Under Siege: Over 1,500 RIPE NCC Network Credentials Leaked! ⚠️"

The telecom industry faces a severe threat as over 1,572 network operator credentials, including those from Orange España, were found circulating in the Dark Web. This follows a recent cyberattack on Orange España, involving a BGP hijack. The attack led to a service outage and revealed the risks associated with privileged network personnel. Cybersecurity firm Resecurity's scan discovered compromised accounts from RIPE, APNIC, AFRINIC, and LACNIC registries, emphasizing the urgent need for improved digital hygiene and robust security measures.

Tags: #CyberSecurity #TelecomSecurity #DigitalIdentity #DataBreach #DarkWeb #BGP #RPKI #Infostealers

Source: Resecurity

www.resecurity.comResecurity | Hundreds of network operators’ credentials found circulating in the Dark Web

"🔍 Unveiling Sandman APT: The Silent Menace Targeting Global Telcos 🎯"

SentinelLabs has unearthed a new threat actor dubbed Sandman APT, primarily targeting telecommunication providers across the Middle East, Western Europe, and South Asia. This enigmatic group employs a novel modular backdoor named LuaDream, utilizing the LuaJIT platform, a rarity in the threat landscape. The meticulous movements and minimal engagements hint at a strategic approach to minimize detection risks. The LuaDream malware, a well-orchestrated and actively developed project, is designed for system and user info exfiltration, paving the way for precision attacks. The intriguing part? The attribution remains elusive, hinting at a private contractor or a mercenary group akin to Metador. The activities observed are espionage-driven, with a pronounced focus on telcos due to the sensitive data they harbor. The meticulous design of LuaDream showcases the continuous innovation in the cyber espionage realm, urging for a collaborative effort within the threat intelligence community to navigate the shadows of the threat landscape.

Source: SentinelOne Labs

Tags: #SandmanAPT #LuaDream #TelecomSecurity #CyberEspionage #ThreatActor #CyberSecurity #LuaJIT #SentinelLabs #APT 🌐🔐🎯

Indicators of Compromise (IoCs):

  • Domains: mode.encagil[.]com, ssl.explorecell[.]com
  • File Paths: %ProgramData%\FaxConfig, %ProgramData%\FaxLib
  • SHA1:
    • fax.dat: 1cd0a3dd6354a3d4a29226f5580f8a51ec3837d4
    • fax.Application: 27894955aaf082a606337ebe29d263263be52154
    • ualapi.dll: 5302c39764922f17e4bc14f589fa45408f8a5089
    • fax.cache: 77e00e3067f23df10196412f231e80cec41c5253
    • UpdateCheck.dll: b9ea189e2420a29978e4dc73d8d2fd801f6a0db2
    • updater.ver: fb1c6a23e8e0693194a365619b388b09155c2183
    • fax.module: ff2802cdbc40d2ef3585357b7e6947d42b875884

Author: Aleksandar Milenkoski, a seasoned threat researcher at SentinelLabs, has meticulously dissected the activities of Sandman APT, shedding light on the LuaDream backdoor. His expertise in reverse engineering and malware research is evident in the detailed analysis provided.

SentinelOneSandman APT | A Mystery Group Targeting Telcos with a LuaJIT ToolkitSophisticated threat actor deploys high-end malware utilizing the LuaJIT platform to backdoor telcos in Europe, Middle East and South Asia.