February 25, 2026 Source: BleepingComputer 3 min read · 631 words

Chinese cyberspies breached dozens of telecom firms, govt agencies

Китайські кібершпигуни провели брейчі десятків телеком-компаній та урядових агентств

Chinese Cyberspies Breach Dozens of Telecom Firms and Government Agencies

Google's threat researchers just disrupted something big. A sprawling espionage campaign linked to Chinese state-sponsored attackers has been methodically infiltrating telecom companies and government agencies across multiple countries. And the sophistication of their approach should worry anyone responsible for critical infrastructure.

According to BleepingComputer, the investigation involved Google's Threat Intelligence Group, Mandiant, and international partners working in concert to expose and shut down the operation. What makes this campaign particularly nasty is how the attackers disguised their command-and-control traffic—they buried malicious commands inside routine SaaS API calls, making them virtually indistinguishable from legitimate business communications.

The Breach

Dozens of organizations fell victim to this campaign. We're talking about telecom providers—the backbone of global communications—alongside numerous government agencies. The targeting wasn't random. These aren't companies hackers stumble into by accident.

This is the kind of operation that reveals how Chinese cyber attack capabilities have evolved far beyond typical corporate espionage. The attackers went after infrastructure providers and government systems with precision. The real question is: how long were they inside before anyone noticed?

And that's where it gets complicated. Telecom breaches are particularly dangerous because these organizations hold access credentials, routing information, and surveillance capabilities that foreign intelligence services absolutely covet. A compromised telecom is a compromised nation's communications.

Under the Hood

The technical approach here deserves attention. Rather than relying on traditional malware or obvious command channels, the attackers weaponized SaaS platforms themselves. They nested their malicious traffic inside API calls to legitimate software-as-a-service providers. Cloud services. The infrastructure everyone relies on and, frankly, trusts implicitly.

Why does this matter?

Because security teams typically monitor for known malware signatures and suspicious network patterns. They're trained to catch the obvious stuff. But legitimate API traffic to Salesforce, Slack, Microsoft 365—that all looks clean. That's where these attackers hid their commands and data exfiltration.

The attackers didn't need to break through firewalls with battering rams. They walked through the front door disguised as ordinary business transactions. It's elegant. It's also terrifying because it suggests a level of operational security that goes far beyond typical criminal hacking.

The Fallout

Government agencies and telecom firms are now in damage assessment mode. Mandiant and Google have already disrupted the attacker infrastructure, but the cleanup is just beginning. Organizations are spinning up incident response teams, tracing what data was accessed, and figuring out how many privileged credentials may have been compromised.

This incident underscores something uncomfortable: China's vulnerability to discovery doesn't come from technical limitations but from operational exposure. Once a campaign reaches this scale—targeting dozens of organizations—staying hidden becomes nearly impossible. That doesn't make the damage any less severe.

The broader implications extend to telecom security standards globally. These breaches will inevitably trigger regulatory responses, new security requirements, and probably congressional hearings in multiple countries. For organizations caught in this campaign, there's also the question of whether they can ever fully trust their own infrastructure again.

Protecting Yourself

If you're responsible for critical infrastructure or government systems, start with API security. Don't just monitor SaaS platforms for what they should be doing—monitor them for what they're actually doing. Unusual API calls at unusual times. Bulk data downloads to new accounts. API activity from unexpected geographic locations.

Segment your network aggressively. Don't give every system access to every cloud service. Implement zero-trust principles where possible. And if you work in telecom? Assume you're already a target. Act accordingly.

Check your logs going back at least six months. Coordinate with your security partners. Contact law enforcement and intelligence agencies if you haven't already. The disruption happened—but previous victims' data may still be in attacker hands.

This campaign shows us something important: the old playbook doesn't work anymore. The attackers aren't crude. They're not trying to be sneaky about being sneaky. They're hiding in plain sight, inside the tools we use every day. That's the real threat landscape now.

Read original article →

// FAQ

Which telecom companies and government agencies were breached in this Chinese cyber attack?

Google and Mandiant haven't publicly named specific organizations affected, though they confirmed dozens of telecom firms and government agencies were targeted. Organizations impacted should have been contacted directly by threat researchers and law enforcement.

How did attackers hide malicious traffic in SaaS API calls?

The attackers nested their command-and-control communications inside legitimate API requests to popular SaaS platforms like cloud services. This made malicious activity appear as normal business transactions, evading traditional security monitoring.

What should organizations do if they suspect they were affected by this campaign?

Review API logs for unusual activity dating back at least six months, implement stricter API monitoring and network segmentation, coordinate with law enforcement and cybersecurity partners, and assess what credentials or data may have been compromised.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →