> series: anatomy_of_a_breach —— part: 038 —— target: nortel_networks —— duration: ~10_years —— attacker: chinese_state<span class="cursor-blink">_</span>_
In February 2012, the Wall Street Journal reported that Chinese state-sponsored hackers had maintained persistent access to Nortel Networks — once Canada's largest technology company — for approximately a decade, from at least 2000 until the company filed for bankruptcy in 2009. The attackers had compromised the passwords of seven senior executives, including the CEO, and used them to access everything: strategic planning documents, research and development data, business plans, employee emails, and internal communications.
Brian Foran, a Nortel security adviser who investigated the intrusions, discovered the breach in 2004 — but his warnings were largely ignored by management. The company changed the compromised passwords but took no further action to investigate the scope of the compromise, remediate the intrusion, or harden its systems against further attack. The hackers simply returned, establishing new access through rootkits and backdoors that persisted until Nortel ceased operations. When Nortel's assets were sold during bankruptcy — patents acquired by a consortium including Apple, Microsoft, and others for $4.5 billion — the question of whether compromised infrastructure was part of the sale was never publicly resolved.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Nortel breach persisted for a decade because the company lacked three capabilities: detection (no monitoring to identify the ongoing intrusion), investigation (no incident response when the breach was discovered in 2004), and remediation (no comprehensive action to remove the attackers and harden against re-entry). These are exactly the capabilities that modern security programmes must provide.
SOC in a Box provides 24/7 monitoring that detects APT-style intrusions — the encrypted communications, lateral movement, and data exfiltration that characterised the Nortel compromise. Our red team engagements simulate nation-state attack techniques to test whether your detection capabilities would identify a Nortel-style persistent intrusion. Cyber Essentials establishes the baseline controls. And UK Cyber Defence's incident response service provides the investigation and remediation capability that Nortel's management chose not to commission in 2004.
<a href="https://www.socinabox.co.uk">SOC in a Box</a> detects. <a href="/penetration-testing/red-team">Red team testing</a> validates. <a href="https://www.cyber-defence.io/services/incident-response">Incident response</a> investigates and remediates. Because the difference between Nortel and a company that survives an APT intrusion is not whether the breach is discovered — it is what happens next.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call