
"... the crew compromised systems used for performing communications wiretapping for law enforcement..."
Wow, didn't see that coming! Who would've thought that a built-in back door could be exploited?
Attackers - possibly China's Salt Typhoon cyber-espionage crew - compromised an unnamed wireline provider's network and used this access to try to break into T-Mobile US systems multiple times over the past few weeks, according to its Chief Security Officer Jeff Simon. Simon was among the telecom execs who met White House …
Eh I don't know, but bragging like this could be seen by some as a challenge...
Reminds me of the Discworld method of committing suicide by walking into the Mended Drum tavern and announcing your name as 'Vincent the Invulnerable' or any such nonsense.
Icon: GNU PTerry
Couldn't help noticing this challengey line from their blog:
Layered defenses that more effectively deter attacks, essentially a series of gates that are increasingly difficult to pass
All they need is a high score table and a chat lobby and they're gamified their network security.
Maybe_Salt_Typhoon - Level 1 (compromised wireline provider) [Game In Progress]
Welcome to The T-Mobile Intranet(TM)
(C) 1977-2024 Infocom, Inc.
You are in your compromised account's home directory.
You see: A Collection of TXT files; A JPG; A File Named "Passwords.DOC".
Exits: North, West.
> GO NORTH
A firewall blocks your path!
> EXAMINE FIREWALL
It says "Palo Alto Networks"
...