Major telecom services provider Ribbon breached by state hackers
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要快速浏览一下文章内容。文章讲的是Ribbon Communications公司被国家支持的黑客入侵了他们的IT网络。入侵发生的时间是在2024年12月,但直到2025年9月才被发现。Ribbon是为美国政府和全球电信公司提供服务的,客户包括洛杉矶市、国防部和一些大电信公司。 接下来,文章提到Ribbon在SEC的文件中披露了这一事件,并且他们正在与第三方网络安全专家和联邦执法机构合作调查。目前还没有证据显示攻击者窃取了重要信息,但确实访问了一些客户的文件。虽然Ribbon没有明确指出是谁干的,但这次攻击与去年与中国盐旋风网络间谍集团有关的电信业大规模入侵相似。 所以,总结的时候需要涵盖以下几点:Ribbon被国家支持的黑客入侵的时间、发现时间、客户群体、调查情况、是否有信息泄露、以及可能的攻击者背景。 现在要控制在100字以内,所以要简洁明了。比如: Ribbon Communications遭遇国家支持的黑客攻击,最早可追溯至2024年12月。该公司于2025年9月发现入侵,并正在与专家和执法机构合作调查。目前未发现重要信息被盗,但客户文件可能被访问。此次事件与去年中国盐旋风集团相关的大规模电信入侵相似。 这样应该差不多了。 </think> Ribbon Communications遭遇国家支持的黑客攻击,最早可追溯至2024年12月。该公司于2025年9月发现入侵,并正在与专家和执法机构合作调查。目前未发现重要信息被盗,但客户文件可能被访问。此次事件与去年中国盐旋风集团相关的大规模电信入侵相似。 2025-10-30 19:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:18 收藏

Ribbon Communications

Ribbon Communications, a provider of telecommunications services to the U.S. government and telecom companies worldwide, revealed that nation-state hackers breached its IT network as early as December 2024.

Ribbon provides networking solutions and secure cloud communications services to telecommunications companies and critical infrastructure organizations worldwide.

The company has over 3,100 employees in 68 global offices, and its list of customers includes the City of Los Angeles, the Los Angeles Public Library, the University of Texas at Austin, government customers (such as the U.S. Department of Defense), and telecom providers like Verizon, CenturyLink, BT, Deutsche Telekom, Softbank, and TalkTalk.

As disclosed in a filing with the U.S. Securities and Exchange Commission (SEC) on October 23, Ribbon detected the breach in September 2025; however, evidence discovered so far indicates that the attackers first gained access to its systems in December 2024.

"In early September 2025, the Company became aware that unauthorized persons, reportedly associated with a nation-state actor, had gained access to the Company's IT network," Ribbon said.

"While the investigation is ongoing, the Company believes that it has been successful in terminating the unauthorized access by the threat actor. The Company has preliminarily determined that initial access by the threat actor may have occurred as early as December 2024, with final determinations dependent on completion of the ongoing investigation."

Ribbon is now working with third-party cybersecurity experts and federal law enforcement to investigate the breach and said that it has yet to find evidence that the threat attackers accessed or stole "any material information."

However, the company found that the attackers had gained access to files belonging to several customers, stored on two laptops outside of Ribbon's main network.

Although Ribbon expects to incur additional costs in the fourth quarter of 2025 related to the breach investigation and its network strengthening efforts, it does not currently anticipate these costs to be material.

While Ribbon has yet to attribute the cyberattack to a specific threat actor or hacking group, the breach bears resemblance to a series of widespread telecom breaches from last year that were linked to China's Salt Typhoon cyber-espionage group.

At the time, CISA and the FBI confirmed that the Chinese state hackers had breached multiple telecom providers (including AT&T, Verizon, Lumen, Consolidated Communications, Charter Communications, and Windstream), as well as other telecom firms in dozens of different countries.

Comcast and Digital Realty were also flagged in June as potentially compromised by the Salt Typhoon hacking group, with satellite communications company Viasat revealing weeks later that it had also been hacked as part of the same campaign.


文章来源: https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/
如有侵权请联系:admin#unsafe.sh