Government Hackers Lurked Inside Ribbon Communications for Months

Government Hackers Lurked Inside Ribbon Communications for Months

Nation-state hackers quietly accessed U.S. telecom supplier Ribbon Communications for most of the past year, according to disclosures this week. The breach underscores how attackers target vendors tha...

Elena Diop
Elena Diop·Tech & Innovation Reporter
·2 min read

Nation-state hackers quietly accessed U.S. telecom supplier Ribbon Communications for most of the past year, according to disclosures this week. The breach underscores how attackers target vendors that sit between carriers, clouds, and governments, and it raises new questions about visibility across telecom supply chains. 

Ribbon, a Texas-based backbone supplier whose customers include major carriers and U.S. government entities, said it detected unauthorized access in early September 2025. Preliminary forensics suggest the intrusion began in December 2024. Investigators found that four “older” customer files on two laptops outside the core network were accessed, affecting at least three smaller customers. The company has not named the actor or victims, and says it does not expect a material financial impact. 

Analysis

This incident fits a growing pattern, attackers bypass well-defended carriers by compromising upstream vendors that handle signaling, voice, and network software. Ribbon’s role as a provider of real-time voice and data technology makes it a high-value pivot for espionage. Even if the accessed files were “older,” persistent access for nine to twelve months indicates patience, resourcing, and intent typical of advanced state groups. The lack of named attribution is common at this stage, but sector telemetry and timeline echo other state campaigns against telecom and IT suppliers. 

Implications

Share:XWhatsApp
Elena Diop

Elena Diop

Tech & Innovation Reporter

Leads the Tech & Innovation Desk, exploring AI, digital culture, and emerging technology ecosystems across Africa and beyond. Powered by Calmorah Intelligence™ with human oversight.

View all articles →

More from Tech