Ribbon Communications, a U.S. company that supplies critical technology to the global telecommunications sector, confirmed a sophisticated, long-term intrusion. This incident highlights the persistent threat of nation-state cyberattacks against vital components of the technology supply chain.
The breach at the Texas-based company, which provides essential voice and data communication services, has raised serious telecommunications security concerns.
According to a recent SEC filing, an adversary “reportedly associated with a nation-state actor” gained access to the company's internal IT network in December 2024 and maintained that access for almost a year before being discovered in October 2025.
While Ribbon Communications has not identified the specific nation-state responsible, it confirmed that the attacker accessed several customer files saved on two laptops.
The company stated its investigation has so far revealed that three "smaller customers" were impacted by the incident. It also noted there is currently no evidence that the threat actor accessed customer systems or that any government clients were affected.
“Several customer files saved outside of the main network on two laptops do appear to have been accessed by the threat actor,” said a spokesperson cited by Reuters, adding there were a total of four “older files.”
The attack on Ribbon Communications underscores a strategic trend where advanced persistent threat (APT) groups target IT and networking service companies that support critical infrastructure. These entities are lucrative targets because they can serve as a conduit to a wide range of sensitive government and private-sector organizations.
This incident serves as another example of threat actors targeting suppliers to enable potential downstream attacks and global espionage. Experts note that actors, particularly those aligned with China and Russia, often aim to establish long-term persistence within these supplier networks to facilitate global espionage operations.
“This central role as a supplier to sensitive government and infrastructure clients makes Ribbon a lucrative target for state-aligned actors, particularly from China and Russia," said Pete Renals, director of national security programs for Unit 42 at Palo Alto Networks, cited by Reuters.
China recently alleged that U.S. cyber espionage targeted the country’s National Time Service Center around the same time a F5 cybersecurity breach was announced, linked to China-backed nation-state threat actors.
In other recent news, the financially motivated BlueNoroff APT group was seen running two sophisticated campaigns targeting the Web3 and venture capital sectors.