{"id":209756,"date":"2025-03-26T06:13:48","date_gmt":"2025-03-26T11:13:48","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/03\/chinese-hackers-breach-asian-telecom-remain-undetected-for-over-4-years"},"modified":"2025-03-26T06:13:48","modified_gmt":"2025-03-26T11:13:48","slug":"chinese-hackers-breach-asian-telecom-remain-undetected-for-over-4-years","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/03\/chinese-hackers-breach-asian-telecom-remain-undetected-for-over-4-years","title":{"rendered":"Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/chinese-hackers-breach-asian-telecom-remain-undetected-for-over-4-years.jpg\"><\/a><\/p>\n<p>A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia.<\/p>\n<p>The cybersecurity company is tracking the activity under the name <strong>Weaver Ant<\/strong>, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not disclosed.<\/p>\n<p>\u201cUsing web shells and tunneling, the attackers maintained persistence and facilitated cyber espionage,\u201d Sygnia <a href=\"https:\/\/www.sygnia.co\/threat-reports-and-advisories\/weaver-ant-tracking-a-china-nexus-cyber-espionage-operation\/\" rel=\"noopener\" target=\"_blank\">said<\/a>. \u201cThe group behind this intrusion [\u2026] aimed to gain and maintain continuous access to telecommunication providers and facilitate cyber espionage by collecting sensitive information.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-209756","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/209756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=209756"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/209756\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=209756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=209756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=209756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}