Ransomware Advanced Persistent Threats Hacking Groups Social Engineering Exploitation Techniques Nation-State Actors Scattered Spider Malware State-Sponsored Attacks Ransomware Groups
The activity fits a pattern of telecom intrusions used to collect sensitive communications data.