Unmasking Operation Soft Cell: The Persistent Chinese Cyber Espionage Campaign Targeting Middle East Telecoms

In the first quarter of 2023, telecom providers in the Middle East became the targets of a new cyber attack campaign conducted by a Chinese espionage actor. Attribution was made based on similarities in tooling overlaps to a known campaign dubbed “Operation Soft Cell.” This campaign has been ongoing for over a decade, with various espionage campaigns conducted against telecom providers globally.

Attribution of cyber attacks to a Chinese espionage actor

The intrusion set used in the Middle East was attributed to a Chinese espionage actor associated with Operation Soft Cell. The specific group is also known as Gallium and has traditionally targeted unpatched, internet-facing services. The latest campaign followed the same modus operandi with the goal of obtaining footholds within targeted telecom networks.

Methodology used by the threat actor during the attack

Once a foothold had been established, the attackers conducted various activities such as reconnaissance, credential theft, lateral movement, and data exfiltration. The attack was carried out with careful consideration to ensure maximum stealth and long-term access.

History of Operation Soft Cell targeting telecommunications providers

Operation Soft Cell has been running since at least 2012, primarily targeting telecom providers in Asia, Europe, Africa, and the Middle East. The main objective of the campaign is to access customers’ call records, messages, and other sensitive communication data. The group is known for stealing data and remaining undetected within systems for spans of up to five years.

Use of tools by the threat actor such as Mimikatz and PingPull

The Soft Cell threat actor utilized various tools, such as Mimikatz and PingPull, in its espionage campaigns. Mimikatz is a well-known credential theft tool used to obtain access to sensitive network resources. PingPull is a backdoor employed in a variety of campaigns with stealth capabilities that are difficult to detect. The use of these tools points to the advanced capabilities of the threat actor.

Focus on custom toolsets to maintain stealth

The central aspect of the recent campaign was the deployment of a custom variant of Mimikatz called mim221. This variant packed additional anti-detection features. The group also employed special-purpose modules that implemented advanced techniques, indicating their dedication towards weaponizing infrastructure to the fullest extent to avoid detection.

Detection and prevention of the attacks:

The recent cyber attacks in the Middle East were eventually thwarted, and no implants were deployed on the target networks. With increased awareness, threat intelligence, and early detection, defenders are better equipped to stop cyber attacks. Telecom providers should take a layered approach to security, including:

1. Keeping all software up-to-date,
2. Blocking unnecessary ports on firewalls,
3. Utilizing two-factor authentication,
4. Monitoring for unusual network activity,
5. Deploying enterprise antivirus and network security solutions.

Likelihood of continued upgrades to evade detection

The Soft Cell campaign has been ongoing for close to a decade, however, the group does not appear to be slowing down anytime soon. The group could explore upgrading its tools with new techniques for evading detection, which will make the work of the defenders even more challenging.

With the current cyberattacks on telecom providers, the importance of cybersecurity has been highlighted. The recent attack in the Middle East by a Chinese espionage actor is another pointer to the need for a layered approach to security. The fact that the recent attacks were foiled shows that when organizations have proper security protocols in place, even sophisticated cyber threats can be detected before irreparable damage occurs. Lessons should be learned from this attack, and stakeholders should be vigilant against future threats.

Explore more

How Is the New Wormable XMRig Malware Evolving?

The rapid transformation of cryptojacking from a minor background annoyance into a sophisticated, kernel-level security threat has forced global cybersecurity professionals to fundamentally rethink their entire defensive posture as the landscape continues to shift through 2026. While earlier versions of Monero-mining software were often content to quietly steal idle CPU cycles, the emergence of a new, wormable XMRig variant signals

AI-Driven Behavioral Intelligence – Review

The rapid proliferation of machine-learning-assisted malware has officially transformed the cybersecurity landscape into a high-stakes competition where static defense is no longer a viable strategy for survival. While traditional security measures once relied on a digital library of known threats to protect networks, the current environment demands a system capable of interpreting the intent behind a process rather than just

Trend Analysis: India AI Sovereignty and Evaluation Standards

While the global race to build the largest large language model often dominates technology headlines, a more subtle and arguably more consequential shift is occurring within the Indian subcontinent’s technological landscape. This transition marks a departure from the simple pursuit of “national champion” models toward a more sophisticated objective: the establishment of sovereign evaluation standards. As artificial intelligence becomes deeply

AI and Stolen Credentials Redefine Modern Enterprise Risk

The traditional castle-and-moat defense strategy has become an obsolete relic in an era where digital identities are the primary gateway for highly sophisticated global threat actors. Recent data suggests that enterprise risk has fundamentally transitioned from frequent but localized incidents toward high-impact disruptions that threaten the very fabric of systemic stability. This shift is punctuated by the emergence of identity

How Is AI Accelerating the Speed of Modern Cyberattacks?

Dominic Jainy brings a wealth of knowledge in artificial intelligence and blockchain to the table, offering a unique perspective on the modern threat landscape. As cybercriminals harness machine learning to automate exploitation, the gap between a vulnerability being discovered and a breach occurring is shrinking at an alarming rate. We sit down with him to discuss the shift toward identity-based