Nimbus Manticore Attacking Defense and Telecom Sectors

Nimbus Manticore is an emerging cyber threat group that has been actively targeting the defense and telecommunications sectors. Their recent campaigns demonstrate sophisticated attack techniques aimed at compromising critical infrastructure and stealing sensitive information. This group leverages advanced malware and exploits to infiltrate networks, often focusing on vulnerabilities in telecom equipment and defense contractor systems. The attacks are characterized by stealthy persistence and data exfiltration, posing significant risks to national security and corporate confidentiality. The defense sector has seen a surge in targeted attacks by Nimbus Manticore, with the group exploiting zero-day vulnerabilities and using custom malware to bypass traditional security measures. Their tactics include spear-phishing, supply chain compromises, and exploiting unpatched software. Telecom companies are also prime targets due to their role in communication infrastructure, making them vulnerable to espionage and disruption. Security experts recommend enhanced monitoring, timely patching, and comprehensive incident response plans to mitigate the risks posed by Nimbus Manticore. Collaboration between government agencies and private sector entities is crucial to defend against these sophisticated threats. Understanding the attack vectors and indicators of compromise can help organizations strengthen their cybersecurity posture and protect critical assets from this persistent threat. In conclusion, Nimbus Manticore represents a significant threat to defense and telecom sectors, employing advanced cyber-espionage techniques. Organizations must stay vigilant and adopt proactive security measures to counteract these evolving threats effectively.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 23 Sep 2025 17:10:14 +0000


Cyber News related to Nimbus Manticore Attacking Defense and Telecom Sectors

Nimbus Manticore Attacking Defense and Telecom Sectors - Nimbus Manticore is an emerging cyber threat group that has been actively targeting the defense and telecommunications sectors. Their recent campaigns demonstrate sophisticated attack techniques aimed at compromising critical infrastructure and ...
2 months ago Cybersecuritynews.com CVE-2023-12345 CVE-2024-23456 Nimbus Manticore
Scarred Manticore Targets Middle East With Advanced Malware - An ongoing Iranian espionage campaign led by Scarred Manticore, an actor associated with the Ministry of Intelligence and Security, has been observed targeting high-profile organizations in the Middle East, particularly in the government, military ...
2 years ago Infosecurity-magazine.com OilRig
HackersEra Launches Telecom Penetration Testing to Eliminate Cyber Threats - Cybercriminals have attacked telecom infrastructure, particularly as it shifts to an IP-based design with the introduction of Long-Term Evolution networks, also referred to as LTE or 4G. Persistent attackers could spy on users' cellular networks and ...
2 years ago Cysecurity.news Inception
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Iran-linked Nimbus Manticore targets European governments and NGOs - Iran-linked threat group Nimbus Manticore has been actively targeting European government entities and non-governmental organizations (NGOs) in a recent cyber espionage campaign. This group employs sophisticated tactics, techniques, and procedures ...
2 months ago Infosecurity-magazine.com Nimbus Manticore
CVE-2021-47275 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
International Sting Takes Down SIM Box Criminal Network - An international law enforcement operation has successfully dismantled a sophisticated SIM box fraud network that was causing significant financial losses globally. SIM box fraud involves criminals using SIM cards to bypass traditional telecom ...
2 months ago Darkreading.com
Telecoms’ Cyber Chiefs Adopt Financial Sector’s Model of Collective Defense - WSJ - Telecommunications industry cybersecurity leaders are increasingly adopting a collective defense model inspired by the financial sector to enhance their cyber resilience. This approach involves sharing threat intelligence, coordinating responses, and ...
1 month ago Wsj.com
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches - In January, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Sichuan Juxinhe Network Technology, a Chinese cybersecurity firm believed to be directly involved in the Salt Typhoon telecom ...
7 months ago Bleepingcomputer.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
TRAI Updates Regulations to Prevent SIM Swap Fraud in Telecom Porting - The Telecom Regulatory Authority of India recently announced updated regulations aimed at combating SIM swap fraud in the telecom sector. The TRAI highlighted that this measure is part of its broader efforts to address concerns related to fraudulent ...
1 year ago Cysecurity.news
Integration of Cisco Secure Threat Defense Virtual with Megaport - Business critical data can originate from diverse sources ranging from multiple public clouds, private clouds, and internal servers to a remote employee's device. Securing each data entity individually is time consuming and challenging due to lack of ...
1 year ago Feedpress.me
Ribbon Communications Breach Latest Telecom Attack - Ribbon Communications, a key player in the telecom industry, recently suffered a significant cybersecurity breach, marking the latest in a series of attacks targeting telecommunications infrastructure. This incident highlights the growing threat ...
1 month ago Darkreading.com
UNC1549 Hacks 34 Devices in 11 Telecom Companies Globally, Researchers Say - In a recent cyber espionage campaign, the threat actor group UNC1549 has successfully compromised 34 devices across 11 telecommunications companies worldwide. This sophisticated attack highlights the growing risks faced by critical infrastructure ...
3 months ago Thehackernews.com CVE-2025-12345 CVE-2025-67890 UNC1549
Microsoft: Hackers target defense firms with new FalseFont malware - Microsoft says the APT33 Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to attack defense contractors worldwide. The DIB sector targeted in these attacks comprises over 100,000 defense companies and ...
2 years ago Bleepingcomputer.com APT3 APT33
U.S. company with access to biggest telecom firms uncovers breach by nation-state - Reuters - A major U.S. company with privileged access to some of the largest telecommunications firms has recently uncovered a significant cybersecurity breach attributed to a nation-state actor. This breach highlights the increasing sophistication and ...
1 month ago Reuters.com nation-state actor
French telecommunications giant Orange discloses cyberattack - In February, Orange's Romanian branch was hit by another cyberattack, with the company confirming the breach of a non-critical application after a threat actor using the alias 'Rey' claimed to have stolen thousands of internal documents containing ...
4 months ago Bleepingcomputer.com
Google sues to dismantle Chinese platform behind global toll scams - Google has taken legal action to dismantle a Chinese platform responsible for orchestrating global toll fraud scams. These scams have led to significant financial losses worldwide by exploiting telecom infrastructure to generate fraudulent toll ...
1 month ago Bleepingcomputer.com
FCC Plans Vote to Rescind Biden-Era Ruling on Telecoms Cybersecurity - The Federal Communications Commission (FCC) is preparing to vote on rescinding a Biden-era ruling that mandated enhanced cybersecurity measures for telecommunications companies. This move signals a shift in regulatory approach towards telecom ...
1 month ago Therecord.media
Microsoft Cuts Back Work With Israel’s Defense Ministry - Microsoft has recently scaled back its collaboration with Israel's Defense Ministry, marking a significant shift in its strategic partnerships. This move comes amid increasing scrutiny over the ethical implications and geopolitical sensitivities ...
2 months ago Wsj.com
Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today's Multicloud World - According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business ...
1 year ago Feedpress.me
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report - To illuminate the evolving digital threat landscape and help the cyber community understand today's most pressing threats, we released our annual Microsoft Digital Defense Report. This year's report focuses on five key topics: cybercrime, ...
2 years ago Csoonline.com POLONIUM
Embracing offensive cybersecurity tactics for defense against dynamic threats - In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. The first line of defense is often ...
1 year ago Helpnetsecurity.com
Building a Resilient Cyber Defense - CISO Strategies Unveiled - By bridging technical and business domains, modern security leaders create defense systems that adapt to evolving threats and changing business priorities. By combining strategic vision with tactical execution, security leaders can create defense ...
7 months ago Cybersecuritynews.com
How Public & Private Sectors Can Better Align Cyber Defense - Over the past 25 years, organizations like the FBI's Internet Crime Complaint Center (IC3), the National Cyber Investigative Joint Task Force (NCIJTF), and the Cybersecurity and Infrastructure Security Agency (CISA) have been created. Uncovering ...
10 months ago Darkreading.com