{"id":15983,"date":"2026-03-20T07:06:56","date_gmt":"2026-03-20T07:06:56","guid":{"rendered":"https:\/\/newestek.com\/?p=15983"},"modified":"2026-03-20T07:06:56","modified_gmt":"2026-03-20T07:06:56","slug":"the-espionage-reality-your-infrastructure-is-already-in-the-collection-path","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15983","title":{"rendered":"The espionage reality: Your infrastructure is already in the collection path"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Threat actors have always sought advantage over their targets. Recently we\u2019ve seen two efforts designed for long-term intelligence gain. This activity surfaced right where you would expect inside the enterprise.<\/p>\n<p>Enterprises now sit directly in the adversary\u2019s collection path. They don\u2019t have to be the target; they are on the board and in play because they ride on the same infrastructure the adversary is already exploiting. The CISO\u2019s challenge is to ensure their organization doesn\u2019t become an intelligence channel for someone else simply by virtue of how it connects to the world.<\/p>\n<h2 class=\"wp-block-heading\" id=\"convergence\">Convergence<\/h2>\n<p>Two unrelated campaigns are now intersecting across the same operational dependencies.<\/p>\n<p>The overlap is not coordination; it\u2019s the predictable byproduct of how modern infrastructure centralizes access. When everything routes through a handful of shared services, shared identity layers, and shared connectivity providers, the adversary doesn\u2019t need to coordinate. They simply arrive through the same door.<\/p>\n<p>The targeted collection surfaces are well understood: telecom routing, cloud adjacency, managed service channels, and identity federation. These are the connective tissues enterprises rely on to function. They are also the connective tissues adversaries exploit to monitor authentication, siphon data, and maintain long\u2011term access without ever touching the enterprise directly.<\/p>\n<p>When actors with different missions arrive through the same dependencies, it signals a structural exposure problem. Because these dependencies are shared and unavoidable, the issue is not the individual campaign. It\u2019s the architecture that allows both campaigns to operate upstream of the enterprise with minimal friction and maximum persistence.<\/p>\n<h2 class=\"wp-block-heading\" id=\"commercial-spyware-as-an-intelligence-channel\">Commercial spyware as an intelligence channel<\/h2>\n<p>Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven\u2019t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human\u2011rights defenders, government employees and contractors, and other high\u2011value individuals. Why? These targets have access to information of value that extends well beyond the device. I\u2019ve long posited that criminal entities operate with two goals in mind: enhance capability or monetize information.<\/p>\n<p>The maturation of tradecraft we are seeing today follows the logical arc of the past decade. These include one\u2011click links, zero\u2011click exploit chains, network injection in some cases, and persistent device access. Predator is not a commodity tool. Predator is one of several device\u2011level compromises that become enterprise\u2011level exposures. It is a commercial espionage platform sold to governments or their proxies, and once deployed, it creates upstream surveillance capabilities that intersect directly with enterprise data flows, authentication systems, and service\u2011provider networks.<\/p>\n<p>This is why it matters. These tools don\u2019t just compromise individuals. They compromise the systems those individuals authenticate into, the networks they traverse, and the service providers that carry their traffic. They operate in the same shared dependencies enterprises rely on. The enterprise becomes part of the collection surface whether it wants to or not.<\/p>\n<h2 class=\"wp-block-heading\" id=\"state%e2%80%91aligned-exploitation\">State\u2011aligned exploitation<\/h2>\n<p>In February 2026, Singapore disclosed that UNC3886, a sophisticated cyber\u2011espionage group, had penetrated the networks of all four major telcos servicing Singapore: Singtel, StarHub, M1, and Simba. The threat actors used zero\u2011days, rootkits, and advanced persistence techniques to gain long\u2011term access to backbone infrastructure and technical\/network data.<\/p>\n<p>Think about that for a moment: all four telcos with their infrastructure compromised. These companies serve as part of the country\u2019s national infrastructure, supporting government, enterprise, and individuals alike. When a telco becomes a real\u2011time signals\u2011intelligence collection point, the adversary doesn\u2019t need to break into your environment directly. They can collect from the pathways your environment depends on.<\/p>\n<p>Singapore named the group but not the sponsor. Most external analysis immediately called UNC3886 China\u2011nexus. <a href=\"https:\/\/www.csoonline.com\/article\/4128378\/new-apt-group-breached-gov-and-critical-infrastructure-orgs-in-37-countries.html\">Palo Alto Networks Unit 42\u2019s parallel \u201cShadow Campaigns\u201d report<\/a> on TGR\u2011STA\u20111030 (UNC6619) used similar cautious language: a \u201cstate\u2011aligned group that operates out of Asia.\u201d<\/p>\n<p>The point is not attribution. The point is that the access was upstream, persistent, and structurally embedded. Regardless of point of origin, the CISO\u2019s focus remains the same: Keep these actors from taking up residence in the infrastructure your organization and your clients depend on. The data\u2011protection problem is now structural. The collection is permanent. The access is embedded.<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-does-this-mean-for-cisos\">What does this mean for CISOs<\/h2>\n<p>The operational implications are not theoretical. They are immediate and measurable.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Reevaluate exposure through the lens of shared dependencies, not just internal assets.<\/strong> Your environment is only one part of the attack surface. The dependencies you ride on are also collection points.<\/li>\n<li><strong>Strengthen visibility across telecom, cloud, MSP\/MSSP, and identity pathways.<\/strong> If you cannot see upstream, you cannot defend downstream.<\/li>\n<li><strong>Treat upstream and downstream partners as active components of your threat surface.<\/strong> The adversary already does. Your governance model should reflect the same reality.<\/li>\n<li><strong>Demand attestation from telecom and cloud providers.<\/strong> If your upstream providers cannot demonstrate integrity, you inherit their exposure.<\/li>\n<li><strong>Reduce implicit trust in upstream pathways.<\/strong> Assume compromise in the infrastructure you do not control.<\/li>\n<li><strong>Harden the session layer.<\/strong> Device\u2011level compromise and upstream compromise both lead to the same outcome: the adversary can impersonate your users and collapse your identity layer. Assume token theft, assume impersonation, and design authentication flows that degrade safely under compromise. In other words, design so that if the adversary gets in, they can\u2019t go far.<\/li>\n<li><strong>Shift detection toward low\u2011noise, long\u2011term access patterns typical of intelligence\u2011driven operations.<\/strong> These actors are not loud. They are patient, persistent, and structurally embedded.<\/li>\n<li><strong>Recognize the insurance implications.<\/strong> The Singapore telco breaches are the tipping point. Cyber insurers are now explicitly factoring in the risk of permanent APT residency in backbone infrastructure. Expect materially higher premiums, broader exclusions, and the genuine possibility that organizations riding unvetted telco or cloud providers could become uninsurable at renewal.<\/li>\n<li><strong>Integrate intelligence\u2011driven risk assessments into routine governance and architectural decisions.<\/strong> This is no longer a \u201cnice to have.\u201d It is a requirement for operating in an environment where upstream compromise is the norm, not the exception.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"strategic-reality\">Strategic reality<\/h2>\n<p>Commercial (criminal) and state\u2011linked actors are moving through the same dependencies modern organizations rely on, and that overlap is now a defining feature of the operating environment.<\/p>\n<p>These campaigns are not anomalies. CISOs should see these as a fortuitous heads-ups. The question for CISOs is no longer whether adversaries will target their environment directly. The question is whether the infrastructure they depend on has already been turned into an intelligence platform for someone else and whether they would even know if it had.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors have always sought advantage over their targets. Recently we\u2019ve seen two efforts designed for long-term intelligence gain. This activity surfaced right where you would expect inside the enterprise. Enterprises now sit directly in the adversary\u2019s collection path. They don\u2019t have to be the target; they are on the board and in play because they ride on the same infrastructure the adversary is already&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15983\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15983","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15983"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15983\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}