Year-Long Cyberattack on US Telecom Provider Ribbon Communications

Ribbon Communications, a prominent American telecommunications company responsible for facilitating major phone and data networks globally, has disclosed a significant security breach. The firm has confirmed that nation-state hackers, believed to have affiliations with an unnamed foreign government, infiltrated its systems and remained undetected for nearly a year.

Headquartered in Texas, Ribbon develops technology that supports real-time communications, including the integration of standard voice calls with online systems and conferencing applications. This breach was publicly announced in the company’s 10-Q Quarterly Report filed with the U.S. Securities and Exchange Commission and released on its website on October 23.

Ribbon Communications 10-Q filing with the SEC (Credit: Hackread.com)

Discovery and Damage Assessment

The breach was detected in early September 2025, leading to an immediate investigation. Initial assessments suggested that the unauthorized access could have begun as early as December 2024. Despite the extensive duration of the infiltration, Ribbon has reported no evidence that the attackers accessed any substantial information or penetrated customer systems. Notably, the hackers did manage to access four older customer files stored on two laptops outside of the main network, prompting notifications to the affected smaller customers.

A Broader Espionage Trend

Ribbon is currently collaborating with federal law enforcement and external experts to analyze the breach, asserting that the attackers have been successfully expelled from their network. This incident raises alarms for the broader telecom industry, as Ribbon’s clientele includes major players such as Verizon, BT, Deutsche Telekom, and the U.S. Department of Defense. The growing trend of nation-state actors targeting telecom companies for espionage is alarming, reflecting a consistent pattern in cyber threats.

This breach follows a series of similar high-profile incidents, including recent attacks on technology providers like F5, which suffered the theft of critical source code and vulnerability research. Such displays of targeted aggression emphasize the importance of securing technology providers integral to government and critical infrastructure operations, positioning them as focal points for potential compromises in the global supply chain.

In light of these developments, Ryan McConechy, CTO of Barrier Networks, commented on the attack’s implications, noting the elevated risk posed by nation-state adversaries operating within cyberspace. He emphasized that the protracted duration of the breach without detection is particularly troubling, suggesting the possibility of sophisticated methods employed by the hackers, potentially indicative of a Chinese origin, given their known reliance on stealth tactics to facilitate extended reconnaissance efforts.

McConechy underscored the urgency for critical infrastructure providers to enhance their preparedness against such threats, especially as these attacks intensify. With the UK government recently updating its cyber-Code of Practice for telecommunications firms, adhering to these guidelines may represent a vital initial step for organizations facing similar risks.

Source