Users in Russia faced an internet outage in a targeted DDoS attack on Russian telecom company Beeline. This is the second major attack on the Moscow-based company in recent weeks; the provider has over 44 million subscribers.
After several user complaints and reports from outage-tracking services, Beeline confirmed the attack to local media.
According to Record Media, internet monitoring service Downdetector’s data suggests “most Beeline users in Russia faced difficulties accessing the company’s mobile app, while some also reported website outages, notification failures and internet disruptions.”
Beeline informed about the attack on its Telegram channel, stressing that the hacker did not gain unauthorized access to consumer data. Currently, the internet provider is restoring all impacted systems and improving its cybersecurity policies to avoid future attacks. Mobile services are active, but users have cited issues using a few online services and account management features.
The targeted attack on Beeline is part of a wider trend of cyberattacks in Russia; in September 2024, VTB, Russia’s second-largest bank, faced similar issues due to an attack on its infrastructure.
These attacks highlight the rising threats posed by cyberattacks cherry-picking critical infrastructures in Russia and worldwide.
Experts have been warning about the rise in intensity and advanced techniques of such cyberattacks, damaging not only critical businesses but also essential industries that support millions of Russian citizens.
How Beeline responds to the attack and recovers will be closely observed by both the telecom industry and regulators. The Beeline incident is similar to the attack on Russian telecom giant Megafon, another large-scale DDoS attack happened earlier this year.
According to a cybersecurity source reported by Forbes Russia, the Beeline attack in February and the Megafon incident in January are the top hacktivist cyberattacks aiming at telecom sectors in 2025.
According to the conversation with Forbes, the source said, “Both attacks were multi-vector and large-scale. The volume of malicious traffic was identical, but MegaFon faced an attack from 3,300 IP addresses, while Beeline was targeted via 1,600, resulting in a higher load per IP address.”
A major cybersecurity breach has been reported against the U.S. Treasury Department, specifically its Office of Foreign Assets Control (OFAC). OFAC, which oversees trade and economic sanctions, was accessed by Chinese state-backed hackers in what officials have described as a "major incident."
How the Attack Happened
The breach was through a vulnerability in BeyondTrust, a remote support software used by the Treasury. Hackers exploited this platform to gain unauthorized access to sensitive government systems. OFAC was their primary focus, likely because of its role in managing sanctions against foreign entities, including Chinese individuals and organizations.
OFAC was originally created in 1950 in the Korean War to block assets from China and North Korea. Today, it remains a very central part of U.S. sanctions enforcement. This makes OFAC a high-value target for espionage.
Impact of the Breach
According to the reports, in addition to OFAC, the hackers accessed the Treasury's Office of Financial Research. Officials have so far confirmed that the compromised systems have been secured, and the hackers do not have access any longer. The extent of data stolen or misused is yet to be determined.
The same hacking crew, which identified itself as the "Salt Typhoon," also has been identified with earlier incidents of hacking other major U.S. telecom firms, including Verizon and AT&T, whose breaches enabled illicit access to customers' communications-affecting contents such as sent text messages or calls, among others-as well as wiretaps conducted by police.
Salt Typhoon is not limited to the United States, as there have been reports of similar breaches in telecommunications networks of several countries. This has shown weaknesses in crucial communication infrastructure.
In response to these incursions, U.S. officials have called for more stringent cybersecurity measures. CISA has suggested using encrypted messaging apps such as Signal to secure communications. Moreover, lawmakers are thinking of banning China Telecom's remaining operations in the U.S.
Senator Ron Wyden also introduced new legislation to ensure the US telecom system's security. All these steps are taken to avoid such breaches in the future and to prevent the sensitive data pertaining to the government and private institutions, which would have been accessed by the state-funded cyberattacks. This was a highly sophisticated cyber-espionage campaign, thus proving the explicit necessity for security measures.
A recent report has outlined a large-scale cyberattack widely referred to as the Matrix campaign. This attack has put in jeopardy an estimated 35 million internet-connected devices across the globe. "This attack contributes to slowing down internet connections to homes and exposes businesses to data breaches, operational interruptions, and reputational damage among others," said Aqua Security's threat intelligence team.
The Matrix campaign is a threat that has been orchestrated by an actor called Matrix. The attack leverages vulnerabilities and weak security practices in the devices like home routers, surveillance cameras, and enterprise systems. According to experts, this attack signifies an emerging trend of IoT device and enterprise infrastructure targeting in order to build botnets for DDoS attacks.
How the Matrix Attack Works
They take advantage of the openly available hacking tools, poor passwords, and misconfiguration to enter devices. Methods used are brute-force attacks and exploitation of hardcoded default credentials such as "admin:admin" or "root:camera." Once a device is compromised, it joins a botnet—a network of hijacked devices that can be used to carry out large-scale cyber attacks like DDoS, overwhelming targets with traffic.
Matrix is not only targeting the home router but also, for instance, the Telecom equipment and server infrastructure are under attack through common protocols and applications such as Telnet, SSH, and Hadoop. Even software development life cycle servers are vulnerable to attack; it has proven an evolution of cybercrime through the exploitation of corporate vulnerabilities.
A Cybercrime Evolution: Low Skills, Big Impact
The scariest part of the Matrix attack is that it seems to be the handiwork of a lone, somewhat novice hacker known as a "script kiddie." This attacker, with the aid of widely available AI tools and ready-to-use hacking software, has mounted an unprecedented campaign around the globe.
According to Aqua Security, this attack highlights the ease with which low-skilled hackers can now execute sophisticated attacks, underscoring the growing danger of poorly secured devices.
How to Protect Yourself
To safeguard your devices from becoming part of a botnet, it is essential to take the following precautions:
1. Update Firmware: Ensure your router and other devices run the latest software updates.
2. Strengthen Passwords: Replace default credentials with strong, unique passwords.
3. Secure Access: Where possible, use additional security measures such as two-factor authentication.
Having addressed these vulnerabilities, the users can secure their devices from further attacks. The Matrix campaign reminds everyone that in today's networked world, proper cybersecurity is essential.
According to PTI, the official statement said “To date, more than 1 crore fraudulent mobile connections have been disconnected with the help of Sancharsaathi. Further, 2.27 lakh mobile handsets have been blocked for involvement in cybercrime /financial frauds.”
Telecom fraud has been a persistent issue in India, with millions of users receiving unsolicited calls and messages daily. These spam calls are not only a nuisance but also pose significant security risks. Fraudsters often use these calls to deceive individuals into sharing personal information, leading to financial losses and identity theft.
To address this growing challenge, Trai and DoT have taken a proactive approach by identifying and disconnecting mobile connections that are suspected of being used for fraudulent activities. This massive disconnection drive is a testament to the authorities’ commitment to safeguarding consumers and maintaining the integrity of the telecom network.
The joint effort by Trai and DoT involved a meticulous process of identifying suspicious mobile connections. This was achieved through advanced data analytics and collaboration with telecom service providers. The authorities focused on connections that exhibited unusual patterns, such as high volumes of outgoing calls or messages, which are typical indicators of spam and fraud.
In addition to disconnecting over 1 crore mobile connections, the authorities also blocked 2.27 lakh mobile handsets that were found to be involved in cybercrime and financial fraud. This dual approach of targeting both the connections and the devices used for fraudulent activities ensures a comprehensive crackdown on telecom fraud.
“In the last fortnight, over 3.5 lakh such numbers have been disconnected and 50 entities have been blacklisted. In addition, around 3.5 Lakh unused and unverified SMS headers and 12 Lakh content templates are blocked,” another statement read.
One of the primary objectives of this initiative is to enhance consumer protection. By disconnecting fraudulent connections, Trai and DoT aim to reduce the number of spam calls and messages that consumers receive. This not only improves the user experience but also helps in building trust in the telecom sector.
Moreover, blocking mobile handsets involved in cybercrime is a crucial step in preventing further misuse. Fraudsters often use these handsets to carry out their activities, and blocking them disrupts their operations. This measure also sends a strong message to those involved in such activities that the authorities are vigilant and will take stringent actions against them.
In this blog post, we delve into how mobile networks embrace AI and its impact on consumers and network operators.
Apple, a tech giant known for its innovation, recently introduced “Apple Intelligence,” an AI-powered operating system. The goal is to make iPhones more intuitive and efficient by integrating AI capabilities into Siri, the virtual assistant. Users can now perform tasks more quickly, receive personalized recommendations, and interact seamlessly with their devices.
Telecom companies worldwide are leveraging AI to optimize mobile phone networks. Here’s how:
AI-driven network monitoring has revolutionized fault localization. For instance:
Network operators like Vodafone create AI digital twins—virtual replicas of real-world equipment such as masts and antennas. These digital twins continuously monitor network performance, identifying anomalies and suggesting preventive measures. As a result, operators can proactively address issues and maintain optimal service levels.
The proliferation of AI generates massive data. Consequently, investments in 5G Standalone (SA) networks have surged. Here’s why:
Despite 5G advancements, experts predict that AI’s demands will eventually outstrip its capabilities. Anticipating this, researchers are already exploring 6G technology, expected around 2028. 6G aims to provide unprecedented speeds, ultra-low latency, and seamless connectivity, further empowering AI-driven applications.