Self Assessment

CYFIRMA INDUSTRY REPORT – TELECOMMUNICATIONS & MEDIA

Published On : 2025-07-29
Share :
CYFIRMA INDUSTRY REPORT – TELECOMMUNICATIONS & MEDIA

EXECUTIVE SUMMARY

The CYFIRMA Industries Report delivers original cybersecurity insights and telemetry-driven statistics of global industries, covering one sector each week for a quarter. This report focuses on the telecommunications & media industry, presenting key trends and statistics in an engaging infographic format.

INTRODUCTION

Welcome to the CYFIRMA infographic industry report, where we delve into the external threat landscape of the telecommunications & media industry over the past three months. This report provides valuable insights and data- driven statistics, delivering a concise analysis of attack campaigns, phishing telemetry, and ransomware incidents targeting the telecommunications & media organizations.

We aim to present an industry-specific overview in a convenient, engaging, and informative format. Leveraging our cutting-edge platform telemetry and the expertise of our analysts, we bring you actionable intelligence to stay ahead in the cybersecurity landscape.

METHODOLOGY

CYFIRMA provides cyber threat intelligence and external threat landscape management platforms, DeCYFIR and DeTCT, which utilize artificial intelligence and machine learning to ingest and process relevant data, complemented by manual CTI research.

For the purpose of these reports, we leverage the following data from our platform. These are data processed by AI and ML automation based on both human research input and automated ingestions.

OBSERVED ATTACK CAMPAIGNS

  • Leveraging our Early Warning platform data set, we present known attack campaigns conducted by known advanced persistent threat actors. Both nation-state and financially motivated.
  • Each attack campaign may target multiple organizations across various countries.
  • Campaign durations can vary from weeks to months or even years. They are sorted by the “last seen” date of activity to include the most relevant ones. Note that this may result in campaigns stacking up on later dates, affecting time-based trends.
  • Attribution to specific threat actors can be murky due to increasingly overlapping TTPs and commodity tools used. While suspected threat actors in this report are attributed with high confidence, we acknowledge the potential for inaccuracy.

UNDERGROUND & DARKWEB CHATTER

  • Using freshly developed and dictionary based tagging and processing of underground & darkweb chatter logs, our DeCYFIR platform can now identify industry based topics and multiple categories of context in which the industry is being discussed.
  • This feature is still in development and matching algorithms are actively fine tuned. Some keywords/phrases which are essential for specific industry are very common in cybercrime chatter. Typically many IT terms. For purpose of data gathering, we attempt a fine balance between accurate identification and removal of some keywords that trigger too many false positive detections.

VULNERABILITIES

  • Using very similar freshly developed tagging and processing of underground & darkweb chatter logs over reported CVE logs, our DeCYFIR platform can now identify industry and multiple categories of vulnerabilities in which the industry is being present in reported CVE.
  • This feature is still in development and matching is actively fine tuned. Some keywords which are essential for specific industry are very common in vulnerabilities description. Typically many IT terms. We attempt the same fine balance between accurate identification and removal of some keywords that trigger too many false positive detections.

RANSOMWARE

  • The victim data presented in this report is directly sourced from the blogs of respective ransomware groups. However, it’s worth noting that certain blogs may provide limited victim information, such as only names or domains, while others may be entirely obfuscated. These limitations can impact the accuracy of victimology during bulk data processing.
  • In some cases, multiple companies share the same name but are located in different countries, which may lead to discrepancies in geography and industry. Similar discrepancies occur with multinational organizations where we are not able to identify which branch in which country was compromised. In such a case, we count the country of the company’s HQ.
  • During the training of our processing algorithms, we manually verified results for industry and geography statistics at an accuracy rate of 85% with a deviation of ±5%. We continuously fine-tune and update the process.
  • Data related to counts of victims per ransomware group and respective dates are 100% accurate at the time of ingestion, as per their publishing on the respective group’s blog sites.
  • Finally, we acknowledge that many victims are never listed as they are able to make a deal with the attackers to avoid being published on their blogs.

While this report contains statistics and graphs generated primarily by automation, it undergoes thorough review and enhancement for additional context by CYFIRMA CTI analysts to ensure the highest quality and provide valuable insights.

ADVANCED PERSISTENT THREAT ATTACK CAMPAIGNS

Telecommunications & media industry over past 90 days featured in 9 out of the 16 observed campaigns, which is a presence in 56% of all campaigns. That is increase from 5 in previous 90 days, however a decline in overall share from 83% (5 out of 6).

OBSERVED CAMPAIGNS PER MONTH

May has seen most of the campaigns, followed by mild decline in Jun and another bump during July.

SUSPECTED THREAT ACTORS

Active threat actors come from all corners of the world. Chinese Volt Typhoon and Stone Panda, Russian TA505 and FIN11, Portuguese Jokka, VN, ES and TH Cybercriminals or Pakistani Transparent Tribe.

GEOGRAPHICAL DISTRIBUTION

The US is leading the chart with presence in 9 out 9 observed campaigns. At shared second place Japan with India. South Korea, Australia and Thailand share third place.

TOP ATTACKED TECHNOLOGY

8 out of 9 campaigns used Web Application as primary attack vector. 7 exploited operating system vulnerabilities. Additionally various network, management and infrastructure software was observed.

APT CAMPAIGNS EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: High

Over the past 90 days, the telecommunications & media industry has been significantly affected by advanced persistent threat (APT) campaigns.

Out of the 16 observed APT campaigns, 9 targeted this industry, representing 56% of the observed campaigns. This is an increase from the previous 90-day period, during which 5 out of 6 campaigns targeted this industry.

Monthly Trends

  • May saw the majority of the campaigns.
  • June experienced a mild decline.
  • July saw another bump in the number of campaigns.

Key Threat Actors
Active threat actors originate from various regions worldwide. Examples include Chinese Volt Typhoon and Stone Panda, Russian TA505 and FIN11, Portuguese Jokka, Vietnamese, Spanish, and Thai cybercriminals, and Pakistani Transparent Tribe.

Geographical Impact
overall 19 countries recorded victims in observed campaigns. The United States leads the chart with its presence in nine out of nine observed campaigns. Japan and India share second place, while South Korea, Australia, and Thailand share third place.

Targeted Technologies
Eight out of nine campaigns employed Web Applications as their primary attack vectors. Seven of these campaigns exploited operating system vulnerabilities. Furthermore, various network, management, and infrastructure software was observed.

UNDERGROUND & DARKWEB CHATTER ANALYSIS

Over the past three months, CYFIRMA’s telemetry has identified 10,271 mentions of telecommunications & media industry out of a total of 58,932 industry mentions. This is from total of 300k+ posts across various underground and dark web channels and forums.

Telecommunications & media industry placed 2nd out of 14 industries in last 90 days with share of 17.4% of all detected industry-linked chatter.

Below is a breakdown by 30 days periods of all mentions.

GLOBAL CHATTER CATEGORIES

Data Leaks and Data Breaches are by far the most common category of recorded chatter for this industry showing high sustained interest. Ransomware chatter has been surged in last 30 day.

UNDERGROUND & DARKWEB EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: High

In total, telecommunications & media industry comprise 17.4% of all detected industry underground and dark web chatter in the last 90 days. And ranking 2nd out of 14 industries.

Below are observed key trends across 90 days:

Data Breach & Leak: High and Sustained

Data Breach: 1339 → 1590 → 1512

Data Leak: 1429 → 1625 → 1573

Although slightly down in the latest period, both remain elevated, indicating persistent targeting and compromise of sensitive data, including subscriber, infrastructure, and communication records.

Ransomware Surged in Latest Period
144 → 118 → 273 (↑85% from previous) Ransomware chatter nearly doubled, suggesting renewed attacker focus on high-value telecom and media infrastructure, likely due to the potential for service disruption or high ransom payouts.

DDoS Activity Continues to Decline
93 → 68 → 44, Reflects a shift away from volumetric disruptions, most likely linked to decline in hacktivism activity in same period.

Claimed Hacks Decreasing
66 → 76 → 58, Slight decline indicates fewer publicly flaunted intrusions, but still suggests a steady stream of breaches, many potentially monetized or leveraged privately.

Web Exploit Chatter Shrinking
61 → 62 → 33, A sharp drop in the most recent period (↓47%) could reflect better web security or attackers pivoting.

Hacktivism Fading
57 → 35 → 15, Indicates declining ideological motivation to target this industry—possibly due to geopolitical shifts or changing activist focus.

VULNERABILITIES ANALYSIS

Over the past three months, CYFIRMA’s telemetry has identified 269 mentions of telecommunications & media industry out of a total of 2,448 industry mentions. This is from over 10k CVEs reported and updated in last 90 days.

Telecommunications & media industry ranked 3rd out of 14 industries in last 90 days with share of 10.99% of all detected industry linked vulnerabilities.

Below is a breakdown by 30 days periods of all mentions.

VULNERABILITY CATEGORIES

Remote & Arbitrary Code Execution (RCE & ACE), Injection Attack and Buffer vulnerabilities are leading the chart, as they recorded spike during first 30 days. Privilege Escalation & Access Control Issues have recorded significant increase in previous 30 days.

VULNERABILITIES EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: High

In total, telecommunications & media industry comprise of 10.99% of all detected industry-linked vulnerabilities in the last 90 days. And ranking 3rd out of 14 industries.

Below are observed key trends across 90 days.

Remote & Arbitrary Code Execution (RCE & ACE)
30 → 14 → 21, Still the most dangerous vulnerability class, with a recent resurgence.

Injection Attacks
23 → 18 → 17, Slight decline, but still high. Suggests consistent targeting of databases, APIs, and web services.

Memory & Buffer Vulnerabilities
21 → 9 → 15, Fluctuating but rising again. These are often tied to firmware or embedded telecom systems, and can lead to RCE or DoS.

Denial of Service (DoS) & Resource Exhaustion
15 → 9 → 17, Rebounding sharply in the last 30 days. Mirrors increasing dark web chatter around DDoS disruptions. Highly relevant for uptime- sensitive providers.

Privilege Escalation & Access Control
7 → 18 → 2, After a major spike, there’s now a sudden drop. Could reflect temporary exploitation of known privilege flaws that have since been patched.

Cross-Site Scripting (XSS) & Clickjacking
7 → 6 → 8, Low but steady – typically tied to web interfaces, client portals, or streaming services.

Information Disclosure & Data Leakage
5 → 3 → 1, Minimal in recent reports, but with dark web chatter on data breaches staying high, this might indicate underreported or non- public vulnerabilities.

Directory Traversal & Misconfigurations
Very low. Just 1 mention each in First and Last 30 Days; zero otherwise. Still relevant in legacy or misconfigured environments.

RANSOMWARE VICTIMOLOGY

In the past 90 days, CYFIRMA has identified 49 verified ransomware victims in telecommunications & media industry. This accounts for 3.5% of the overall total of 1,1450 ransomware victims during the same period. Placing telecommunications & media industry 12th out of 14 industries.

Furthermore, a quarterly comparison reveals a mild drop in victims in the telecommunications & media industry, with a reduction of -14% from 57 to 49 victims. However, the overall share of victims increased from 2.59% to 3.38% of all victims.

INDUSTRY MONTHLY ACTIVITY CHART

Over the past 180 days, numbers of victims are mixed. Ignoring just few days of January we can see low February, followed by top in May, then drop towards May and June and new spike in July.

BREAKDOWN OF ACTIVITY PER GANG

A breakdown of monthly activity per gang provides insights into which gangs were active each month. For example, by far the most active gang Qilin was active in June and July. On the other hand, fourth most active gang Devman recorded all victims in May.

Out of the 72 gangs, 28 recorded victims in this industry in the last 90 days (39% participation). Qilin had the highest number of victims (7) but low share (3.5%).

The share of victims for most gangs in this industry is low. From the top 10, only one gang with more than 1 victim recorded a share above 10% – Global (11.1%).

Devman (8.3%), Embargo (20%), and IMNCrew (10%) had the highest share of victims; implying some focus on this industry.

Spike of 100% shares are by gangs with 1 victim overall.

VICTIMS PER INDUSTRY SECTOR

Publishing, Advertising and Broadcasting are the most frequent victims of ransomware in this industry.

GEOGRAPHIC DISTRIBUTION OF VICTIMS

The geographic distribution heatmap underscores the widespread impact of ransomware, highlighting the countries where victims in this industry have been recorded in last 90 days.

INDUSTRY VICTIMS PER COUNTRY

Chart shows quarter-to-quarter changes in targeted countries. Data is sorted by the last 90 days and compared to the previous 90 days, marked in blue.

In the last 90 days, the USA recorded 14 victims (29% of all victims). The UK and Italy follow in second and third place. Canada, Spain and France recorded significant drops from previous 90 days period.

RANSOMWARE EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: High

Telecommunications & media industry placed 12th out of 14 monitored industries recording 49 victims in last 90 days. Minor decrease of -14% from 57 victims in previous 90 days period.

Overall share however increased slightly from 2.59% to 3.38% of all ransomware victims.

Monthly Activity Trends
Monthly activity trends show fluctuations over the past 180 days. Excluding a few days in January, February saw a low number of victims, followed by a peak in May. The number then dropped towards May and June, only to spike again in July.

Ransomware Gangs
A total of 28 out of 72 active ransomware groups targeted the this industry in the past 90 days representing 39% participation:

Qilin: The most active with 7 victims and 3.5% (7 out of 199) of all their victims.

Play: Second most active with 5 victims and 4.9% (5 out of 102) share.

Global: Highest shares of 11% (3 out of 27) victims among top gangs.

Geographic Distribution
The geographic distribution of ransomware victims is relatively high yet quite concentrated in the USA which accounts for 29% of all victims.

Notably previously heavily hit countries like Canada, Spain, Brazil or France recorded significant decline in victims.

In total, 25 countries recorded ransomware victims in this industry in last 90 days, five more than 20 in previous period.

For a comprehensive, up-to-date global ransomware tracking report, please refer to our new monthly “Tracking Ransomware” series here.

CONCLUSION

APT Campaigns (High): In the past 90 days, 9 of 16 observed APT campaigns (56%) targeted the telecommunications & media industry—an increase from 5 of 6 campaigns in the previous period. May saw the most activity, with a slight dip in June and renewed activity in July. Threat actors included Chinese (Volt Typhoon, Stone Panda), Russian (TA505, FIN11), Pakistani, Vietnamese, Thai, Spanish, and Portuguese groups. The U.S. was a victim in every campaign; Japan, India, South Korea, Australia, and Thailand were also frequently hit. Web applications were the primary vector (8 of 9 campaigns), often alongside operating systems, network infrastructure, and management tools.

Underground & Dark Web Chatter (High): Telecoms & media accounted for 17.4% of all industry chatter, ranking 2nd. Data breach and leak chatter remained high (1512 and 1573, respectively), reflecting sustained data compromise. Ransomware-related chatter nearly doubled (↑85%) in the latest period, while DDoS (↓53%), web exploits, and hacktivism trended downward. Claimed hacks dipped slightly, indicating more covert or monetized breaches.

Vulnerabilities (High): This sector made up 10.99% of all reported CVEs, ranking 3rd. RCE vulnerabilities surged again (21), while DoS vulnerabilities rebounded (↑89%)—highlighting service disruption risks. Injection flaws (17) and memory issues (15) remained elevated. Privilege escalation dropped sharply after a spike, possibly due to patching. XSS remained steady (8), while disclosure, misconfig, and traversal issues were minimal but persistent.

Ransomware (Low): 49 ransomware victims were recorded (↓14%), placing telecoms & media 12th overall. However, the sector’s share of all ransomware rose slightly from 2.59% to 3.38%. July saw a renewed spike after a quieter May–June. Qilin (7 victims) and Play (5) led activity, with Global gang showing the highest group-specific focus (11%). The U.S. accounted for 29% of victims, and the total geographic spread increased to 25 countries, up from 20 previously.