Ribbon Communications, a major U.S.-based provider of telecommunications technology to governments and critical infrastructure operators, has disclosed a prolonged network breach by a suspected nation-state threat actor. In an SEC filing, the company revealed that attackers had access to its IT network from as early as December 2024 until September 2025, a dwell time of approximately ten months. While the company states no "material information" was taken from its core network, the actor did access several customer files on laptops. The incident highlights the persistent threat of advanced persistent threat (APT) actors targeting the telecommunications sector for espionage and potential supply chain attacks.
Ribbon Communications discovered the intrusion in early September 2025, but a forensic investigation revealed the initial compromise occurred around December 2024. This extended dwell time of nearly a year allowed the threat actor ample opportunity for reconnaissance, lateral movement, and data exfiltration before being detected and evicted.
While the identity of the nation-state actor has not been officially disclosed, the long-term, stealthy nature of the attack is characteristic of espionage-focused APT groups, with some experts suggesting a possible link to Chinese state-sponsored actors who have historically targeted the telecom sector. Ribbon's client list includes high-value targets such as the U.S. Department of Defense, Verizon, and Deutsche Telekom, making it a prime target for intelligence gathering.
The company has confirmed that the attackers accessed four "older files" belonging to three "smaller customers" that were stored on two laptops outside of the main corporate network. However, the full scope and intent of the breach remain under investigation with the assistance of federal law enforcement.
The specific TTPs used by the threat actor have not been made public. However, a ten-month dwell time suggests a sophisticated adversary skilled in evasion and persistence.
T1543 - Create or Modify System Process).T1562 - Impair Defenses) and clearing logs (T1070 - Indicator Removal).T1078 - Valid Accounts) to blend in with normal administrative activity while mapping the network and identifying valuable data.T1078 - Valid Accounts: APTs often use stolen credentials to maintain long-term, low-and-slow access.T1562 - Impair Defenses: Essential for remaining undetected by security tools for such a long period.T1133 - External Remote Services: Likely used for initial access and maintaining command and control.T1021 - Remote Services: Used for lateral movement within the compromised network.T1567 - Exfiltration Over Web Service: Used to exfiltrate the stolen customer files.The primary impact is the potential for a severe supply chain compromise. Even if the direct data loss was limited to a few files, the attacker's long-term access could have been used for:
The incident draws parallels to the 2021 F5 breach, indicating a pattern of APTs targeting core network and technology providers.
No specific Indicators of Compromise (IOCs) have been publicly released.
Detecting such a stealthy, long-term intrusion is extremely challenging and requires a mature security program.
D3-UBA: User Behavior Analysis.D3-LAM: Local Account Monitoring and D3-DAM: Domain Account Monitoring are critical.D3-DO: Decoy Object.M1030 - Network Segmentation.Implementing comprehensive and long-term auditing and log analysis is crucial for detecting the low-and-slow tactics of APT actors.
Strong network segmentation can help contain a breach and prevent an attacker from accessing sensitive data or moving from IT to OT environments.
Strictly controlling and monitoring privileged accounts makes it harder for attackers to use them for lateral movement and persistence.
Using deception technologies like honeypots and decoy documents can help detect and track intruders who have bypassed perimeter defenses.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats