Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Middle Eastern Telecoms for Cyber Operations

Hackers Exploit Middle Eastern Telecoms for Cyber Operations

Posted on May 23, 2026 By CWS

Telecommunications infrastructures across the Middle East are being manipulated by hackers to facilitate large-scale command-and-control (C2) operations. A recent threat intelligence report highlights the misuse of these networks, transforming them into platforms for launching cyberattacks.

Widespread Command-and-Control Activities

In a three-month period, over 1,350 active C2 servers were identified across 98 infrastructure providers in the region, according to the report. This extensive activity covers 14 countries, including Saudi Arabia, the UAE, Turkey, Israel, and others. Notably, C2 infrastructure comprises 93% of all detected malicious activities, dwarfing other threats like phishing sites and exposed directories.

Hunt.io researchers utilized their Host Radar module to correlate C2 servers and malicious infrastructure back to their network sources. This analysis indicates a deliberate selection of hosting environments by attackers, underscoring the strategic concentration of cyber threats.

Significant Findings in Saudi Telecom Networks

Saudi Telecom Company (STC) emerges as a major hub for these operations, housing 981 C2 servers, which accounts for 72.4% of the region’s C2 infrastructure. Researchers suggest this is due to the exploitation of compromised customer endpoints rather than the provider’s direct involvement.

The threats leveraging this infrastructure are diverse, ranging from IoT botnets and phishing kits to state-sponsored espionage tools. These findings highlight the shared use of underlying infrastructure by both criminal groups and nation-state actors.

Implications for Regional Network Security

Beyond STC, other telecoms like Türk Telekom and hosting providers such as SERVERS TECH FZCO in the UAE are also implicated. Türk Telekom hosts 44 C2 servers and exhibits a wide variety of malware, while specialized providers like Regxa Company in Iraq maintain high bulletproof ratings, indicating slow responses to abuse.

Notable malware families include Tactical RMM, Keitaro, and Gophish, among others. These threats are corroborated by offensive frameworks like Cobalt Strike and AsyncRAT, confirming the active presence of both low-level and advanced cyber actors.

Regional Cyber Threats and Defensive Strategies

Various campaigns are actively exploiting this infrastructure. For instance, the Phorpiex botnet operates on Syrian Telecom, while the Eagle Werewolf espionage campaign uses Iraqi hosting for phishing attacks. Additionally, vulnerabilities like CVE-2025-11953 are being targeted on networks such as Saudi Arabia’s Mobily.

Security experts recommend focusing on monitoring hosting providers and network patterns rather than individual threat indicators. This proactive approach could enable security teams to anticipate and mitigate attacks more effectively.

For more updates, follow Cyber Security News on Google News, LinkedIn, and X, and consider setting it as a preferred source on Google.

Cyber Security News Tags:C2 servers, Cybersecurity, Espionage, IoT botnets, Middle East, network security, Phishing, Ransomware, telecom hacking, threat intelligence

Post navigation

Previous Post: Supply Chain Attack Targets art-template npm Package
Next Post: Phishing Scams Targeting 2026 World Cup Intensify

Related Posts

SuperClaw Enhances AI Security Testing with Open-Source Framework SuperClaw Enhances AI Security Testing with Open-Source Framework Cyber Security News
Global Threat: BADIIS Malware Compromises 1,800 Servers Global Threat: BADIIS Malware Compromises 1,800 Servers Cyber Security News
Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Cyber Security News
Trivy Supply Chain Attack Expands to Docker Hub Trivy Supply Chain Attack Expands to Docker Hub Cyber Security News
Windows 10 Update Causes Recovery Environment Issues Windows 10 Update Causes Recovery Environment Issues Cyber Security News
Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark