Categories: Technology

Swiss software company that supplies mobile phone suppliers worldwide hacked – consequences unclear

The ransomware gang 8Base is said to have stolen “a large amount of confidential information” from Nexus Telecom. The victim provides network monitoring software to providers around the world.
Daniel Schurter

Swiss software company Nexus Telecom is hit by a hacker attack. The ransomware gang 8Base is threatening to publish stolen data on its blackmail and leak site on the dark web.

The cybercriminals claim that “a large amount of confidential information” has fallen into their hands.

At Watson’s request, general manager Marco Rhyner confirmed on Wednesday that Nexus Telecom had been hit by a cyber attack. He cannot yet comment on the stolen data and the extent of the damage. Apparently the relevant clarifications are still ongoing.

The cybercriminals threaten that they will publish the stolen data within days.

What is special about the attacked company?

Nexus Telecom develops network monitoring software for the mobile industry. Customers include major providers in Europe, such as British Telecommunications (BT) and Deutsche Telekom, as well as providers abroad.

“For more than 20 years, our team has worked with some of the world’s most advanced public and private communications and application service providers.”

The company was founded in 1993 by an IT entrepreneur and national politician Ruedi Noser, who served on the National Council and the Council of States for the Zurich FDP. In 2013, his company made headlines for selling surveillance software to autocratic Saudi Arabia.

Noser emphasized to NZZ at the time that the monitoring software his company sold abroad could not decrypt the content and was therefore not subject to approval.

In 2016, Nexus Telecom was sold to a foreign company, fell into financial turmoil and had to file for bankruptcy. The company was eventually taken over by the Swiss Generis, based in Schaffhausen and also active in Beijing (China).

Together with the former core team of Nexus Telecom, the company’s assets were acquired, according to Generis’ website. 5G mobile communications and smart city applications are cited as key business areas focused on product development.

Who are the attackers?

8Base is a ransomware group that has been active since March 2022, but only hit the news in the summer of 2023, when its activities were only just behind the infamous Lockbit gang.

Like other well-known ransomware gangs, 8Base operates a darknet website that can only be accessed via Tor, a freely available global anonymity network. The site lists hundreds of hacked companies: all victims who refused to pay ransoms so their stolen data wouldn’t be made public.

What is striking about the victims: This does not include companies or organizations from the Russian Federation or from states of the former Soviet Union. This would be typical for a gang of Russian origin.

The cybercriminals are considered opportunistic when it comes to their choice of victims and their attack tools: late last year, IT security researchers discovered that the 8Base hacker attacks used a variant of the Phobos ransomware.

Phobos is available as Ransomware as a Service (Raas) for cybercriminals. Those responsible for 8Base are probably not experienced programmers. Either way, not only are they using third-party attack tools, they’ve also hacked the security of their own darknet site.

In September 2023, well-known IT security researcher and blogger Brian Krebs revealed that a 36-year-old programmer from the capital of Moldova likely wrote the code for the 8Base chat function, which is integrated into the darknet site and used by criminals. victims is used.

In 2023, a linguistic analysis of 8Base’s (written) communication style revealed a striking similarity to another operation called “RansomHouse”.

The American cybersecurity authority HC3 stated the following about 8Base last November:

“Despite its aggressive portfolio of victims, the origins of the group and the identities of its operators remain a mystery. According to cybersecurity researchers, the speed and efficiency of the group’s current activities do not indicate the start of a new group, but rather the continuation of an established, experienced organization.”

Sources

  • hhs.gov: 8Base Ransomware (November 2023, PDF)
  • krebsonsecurity.com: Who is behind the 8Base Ransomware website? (September 2023)
  • blogs.vmware.com: 8Base Ransomware: A Powerful Player (June 2023)
  • nzz.ch: Surveillance Software for Saudi Arabia (2013)

Daniel Schurter

Source: Watson

Share
Published by
Ella

Recent Posts

Terror suspect Chechen ‘hanged himself’ in Russian custody Egyptian President al-Sisi has been sworn in for a third term

On the same day of the terrorist attack on the Krokus City Hall in Moscow,…

1 year ago

Locals demand tourist tax for Tenerife: “Like a cancer consuming the island”

class="sc-cffd1e67-0 iQNQmc">1/4Residents of Tenerife have had enough of noisy and dirty tourists.It's too loud, the…

1 year ago

Agreement reached: this is how much Tuchel will receive for his departure from Bayern

class="sc-cffd1e67-0 iQNQmc">1/7Packing his things in Munich in the summer: Thomas Tuchel.After just over a year,…

1 year ago

Worst earthquake in 25 years in Taiwan +++ Number of deaths increased Is Russia running out of tanks? Now ‘Chinese coffins’ are used

At least seven people have been killed and 57 injured in severe earthquakes in the…

1 year ago

Now the moon should also have its own time (and its own clocks). These 11 photos and videos show just how intense the Taiwan earthquake was

The American space agency NASA would establish a uniform lunar time on behalf of the…

1 year ago

This is how the Swiss experienced the earthquake in Taiwan: “I saw a crack in the wall”

class="sc-cffd1e67-0 iQNQmc">1/8Bode Obwegeser was surprised by the earthquake while he was sleeping. “It was a…

1 year ago