Government ❯ International Relations ❯ Cyber Warfare ❯ State-Sponsored Attacks
The activity fits a pattern of telecom intrusions used to collect sensitive communications data.