US telco confirms hackers breached systems in stealthy state-backed cyber campaign – and remained undetected for nearly a year
The hackers remained undetected in the Ribbon Communications’ systems for months
State-sponsored hackers breached the systems of US telecoms services firm Ribbon Communications, and stayed undetected for nearly a year.
Ribbon supplies software, IP, and optical networking systems to telecoms service providers, businesses, and critical infrastructure organizations including BT, Verizon, CenturyLink, Deutsche Telekom, and Tata, as well as public-sector bodies such as the US Defense Department and the City of Los Angeles.
In a filing with the US Securities and Exchange Commission (SEC), the company has revealed that “unauthorized persons, reportedly associated with a nation-state actor” had gained access to its network in December 2024.
"The Company promptly initiated its incident response plan and began an investigation, containment and remediation effort using multiple third-party cybersecurity experts, including federal law enforcement," it said.
"While the investigation is ongoing, the Company believes that it has been successful in terminating the unauthorized access by the threat actor."
Ribbon Communications said there was no evidence that the threat actor had accessed or exfiltrated any “material information”, and that it doesn't believe any government customers were impacted.
However, several customer files saved outside of the main network on two laptops appeared to have been accessed. Those customers have been notified, it said.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Who's behind the Ribbon Communications attack>
While the company hasn't identified the nation it believes to be responsible, Ryan McConechy, CTO of Barrier Networks, suggested that China is the most likely culprit.
"We don't know which nation state is behind the attack, or what their MO was, but the fact that they were inside the network for as long as a year before being noticed is deeply concerning," McConechy said.
"This could also suggest the attack was executed out of China, as their attackers often rely on living off the land and stealthy techniques to stay under the radar for as long as possible, allowing them to conduct reconnaissance which can advance their objectives in the future."
He also suggested that further investigation was needed to make sure that government customers weren't impacted.
"As we have seen with Salt Typhoon, Chinese threat actors have targeted major telco providers in the past with the specific objective of eavesdropping and collecting data on high-ranking officials in government, so it must be made clear whether or not this form of spying has occurred," he said.
Jon Abbott, co-founder and CEO of ThreatAware, cautioned Ribbon's customers that they should keep a close eye on future updates from the company.
"Given how long the attackers were inside Ribbon Communications’ systems, the full extent of the compromise may change as investigations continue," he said.
"This incident highlights the need for strong visibility across assets, robust cyber hygiene, and effective user validation. Telecommunications networks are vast and complex, continually expanding with technologies such as IoT and 5G. Without full visibility, security teams struggle to detect threats quickly, giving attackers the opportunity to remain hidden for long periods."
Living off the land techniques
State-backed threat groups, particularly Salt Typhoon, have built a reputation for stealthy attacks such as these in recent years. In June 2025, it was revealed the group breached a US state’s National Guard network in an equally lengthy campaign.
According to the US Department of Defense (DoD), Salt Typhoon laid low in the compromised network for almost a year, accessing military and law enforcement data.
Revelations of the campaign came less than a year after news that the group also breached telecommunications networks to record telephone conversations of “very senior” American political figures.
These long-running campaigns, known as “living of the land attacks”, enable threat groups to essentially lay low in networks, allowing them to conduct reconnaissance and move laterally into other networks.
The problem has reached such an extent that cybersecurity agencies, including the US Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) have issued repeated warnings to critical infrastructure operators.
Indeed, last year, the NCSC, along with Five Eyes allies, issued an advisory to organisations globally, specifically pointing to state-sponsored attackers from China and Russia as key threats in this regard.
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Will autonomous robotics leap forward in 2026?In-depth Connectivity and cost benefits remain barriers, despite breakthroughs in physical AI
-
AWS and NTT Data team up to drive legacy IT modernization in EuropeNews Partnership between AWS and NTT DATA aims to boost AWS European Sovereign Cloud capabilities
-
90% of companies are woefully unprepared for quantum security threats – analysts say they need to get a move onNews Quantum security threats are coming, but a Bain & Company survey shows systems aren't yet in place to prevent widespread chaos
-
LastPass issues alert as customers targeted in new phishing campaignNews LastPass has urged customers to be on the alert for phishing emails amidst an ongoing scam campaign that encourages users to backup vaults.
-
NCSC names and shames pro-Russia hacktivist group amid escalating DDoS attacks on UK public servicesNews Russia-linked hacktivists are increasingly trying to cause chaos for UK organizations
-
An AWS CodeBuild vulnerability could’ve caused supply chain chaos – luckily a fix was applied before disaster struckNews A single misconfiguration could have allowed attackers to inject malicious code to launch a platform-wide compromise
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Supply chain and AI security in the spotlight for cyber leaders in 2026News Organizations are sharpening their focus on supply chain security and shoring up AI systems
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
NHS supplier DXS International confirms cyber attack – here’s what we know so farNews The NHS supplier says front-line clinical services are unaffected
