Ransomware State-Sponsored Attacks Malware Hacktivism Incident Response Cyber Attacks Infrastructure Security Hacking Groups Fraud Prevention Hacker Groups
The activity fits a pattern of telecom intrusions used to collect sensitive communications data.