In Part 1, we introduced the emergence of QAAS (Quantum-AI-APT-Supply Chain)—a sophisticated convergence of threats—and explored why traditional security paradigms are failing to stop them.
๐ Previous Post: The Era of QAAS (Part 1): Why We Are Facing a "New Age of Threats"
Theory is best proven through reality. In Part 2, we analyze how QAAS threats operate in the real world to dismantle existing security frameworks, using specific cases: the SKT/LGU+ breaches, the KT Femtocell incident, the Arup deepfake fraud, and the Lebanon pager explosions.
1. APT and the Collapse of Authentication: The LGU+ & SKT Breaches
The telecommunications APT breaches are representative cases of the "long-term incubation followed by core authentication theft" pattern. This was not a simple hack; it shook the very foundation of mobile security.

Attack Flow: Infiltration via web server vulnerabilities โก Lateral movement โก Installation of BPFDoor backdoor.
Scale of Damage: 23 Linux servers infected, compromising the HSS (Home Subscriber Server)—the core authentication server.
Devastating Consequences : Massive theft of 26,957,749 IMSIs (International Mobile Subscriber Identity), 291,831 IMEIs, and most importantly, Ki (Subscriber Authentication Key) values.
Why it matters:
The compromise of Ki values means an attacker can clone USIMs, intercept SMS and calls, and bypass 2FA (Two-Factor Authentication) entirely. This is a classic QAAS pattern: blending APT persistence, authentication penetration, and critical key exfiltration.
2. Supply Chain Subversion: The KT Femtocell Incident
The KT Femtocell case clearly demonstrates how vulnerabilities in the hardware and software supply chain lead to direct financial loss and why supply chain threats are so lethal.

The Vulnerability: Authentication keys were software-based (making them clonable), and KT’s policy allowed for Cyphering Fallback, exposing SMS to plain-text interception.
The Attack: Attackers deployed approximately 20 illegal femtocells ("Rogue Base Stations"), tricking user devices into connecting to them to steal SMS, IMSI, and IMEI data.
Devastating Consequences: Personal data leak of 22,000 users and over $200,000 in financial damages due to unauthorized micro-payments.
Why it matters:
This incident represents a sophisticated QAAS-style attack where supply chain tampering, authentication weakness, and communication protocol flaws converged to collapse the trust structure of telecom infrastructure.
3. AI Attacks Human Trust: The Arup Deepfake Remittance Fraud

Source: https://fortune.com/europe/2024/05/17/arup-deepfake-fraud-scam-victim-hong-kong-25-million-cfo/
Technical vulnerabilities aren't the only issue. The case of the British engineering firm Arup signals an era where AI "hacks" human judgment.
Overview: AI-generated deepfakes of company executives attended a video conference. Believing the meeting to be real, an employee transferred approximately $25 million USD.
Key Insight: Existing security systems detected absolutely nothing. The essence of the attack was not "technical penetration" of a system, but the destruction of Human Trust.
Why it matters:
This is a stark example showing that AI is no longer just a tool, but an agent capable of executing complex psychological and social engineering attacks.
4. Weaponizing Everyday Devices: The "Internet of Bombs"

Source: https://asiatimes.com/2024/09/the-weaponization-of-everything-has-begun/
The 2024 pager and walkie-talkie explosions in Lebanon are a shocking revelation of the extreme endgame for supply chain attacks.
Overview: Everyday communication devices exploded via remote commands, resulting in over 40 deaths and 3,000 injuries.
The Rise of SDW: This went beyond cyber-attacks; it marked the emergence of SDW (Software-Defined Weapons), where the device itself becomes the bomb through supply chain compromise.
Why it matters:
The fact that consumer electronics can be weaponized signals a fundamental breakdown in the global trust of the supply chain.
Conclusion: QAAS is an Environment, Not Just an Incident
The common thread among these four cases—network hijacking, femtocell cloning, deepfake fraud, and device explosions—is clear: QAAS is a multi-layered attack structure.
Quantum: Neutralizing encryption.
AI: Automating attacks and mastering social engineering.
APT: Long-term infiltration and system takeover.
Supply Chain: Destroying the integrity of hardware and firmware.
In an environment where these elements combine, legacy security paradigms are no longer valid. We have reached a point where we need a philosophical shift in security architecture, not just a simple combination of technologies.
๐ Next: we will take a deep dive into the PAZI (Post-Quantum + AI + Zero Trust + Identity) model—the only viable alternative in the QAAS era.

| CMO(Chief Marketing Officer), ICTK CTO(Chief Technical Officer), ICTK Director, Cisco Systems Korea Developer, SK Teletech |
Read more
In Part 1, we introduced the emergence of QAAS (Quantum-AI-APT-Supply Chain)—a sophisticated convergence of threats—and explored why traditional security paradigms are failing to stop them.
๐ Previous Post: The Era of QAAS (Part 1): Why We Are Facing a "New Age of Threats"
Theory is best proven through reality. In Part 2, we analyze how QAAS threats operate in the real world to dismantle existing security frameworks, using specific cases: the SKT/LGU+ breaches, the KT Femtocell incident, the Arup deepfake fraud, and the Lebanon pager explosions.
1. APT and the Collapse of Authentication: The LGU+ & SKT Breaches
The telecommunications APT breaches are representative cases of the "long-term incubation followed by core authentication theft" pattern. This was not a simple hack; it shook the very foundation of mobile security.
Attack Flow: Infiltration via web server vulnerabilities โก Lateral movement โก Installation of BPFDoor backdoor.
Scale of Damage: 23 Linux servers infected, compromising the HSS (Home Subscriber Server)—the core authentication server.
Devastating Consequences : Massive theft of 26,957,749 IMSIs (International Mobile Subscriber Identity), 291,831 IMEIs, and most importantly, Ki (Subscriber Authentication Key) values.
Why it matters:
The compromise of Ki values means an attacker can clone USIMs, intercept SMS and calls, and bypass 2FA (Two-Factor Authentication) entirely. This is a classic QAAS pattern: blending APT persistence, authentication penetration, and critical key exfiltration.
2. Supply Chain Subversion: The KT Femtocell Incident
The KT Femtocell case clearly demonstrates how vulnerabilities in the hardware and software supply chain lead to direct financial loss and why supply chain threats are so lethal.
The Vulnerability: Authentication keys were software-based (making them clonable), and KT’s policy allowed for Cyphering Fallback, exposing SMS to plain-text interception.
The Attack: Attackers deployed approximately 20 illegal femtocells ("Rogue Base Stations"), tricking user devices into connecting to them to steal SMS, IMSI, and IMEI data.
Devastating Consequences: Personal data leak of 22,000 users and over $200,000 in financial damages due to unauthorized micro-payments.
Why it matters:
This incident represents a sophisticated QAAS-style attack where supply chain tampering, authentication weakness, and communication protocol flaws converged to collapse the trust structure of telecom infrastructure.
3. AI Attacks Human Trust: The Arup Deepfake Remittance Fraud
Source: https://fortune.com/europe/2024/05/17/arup-deepfake-fraud-scam-victim-hong-kong-25-million-cfo/
Technical vulnerabilities aren't the only issue. The case of the British engineering firm Arup signals an era where AI "hacks" human judgment.
Overview: AI-generated deepfakes of company executives attended a video conference. Believing the meeting to be real, an employee transferred approximately $25 million USD.
Key Insight: Existing security systems detected absolutely nothing. The essence of the attack was not "technical penetration" of a system, but the destruction of Human Trust.
Why it matters:
This is a stark example showing that AI is no longer just a tool, but an agent capable of executing complex psychological and social engineering attacks.
4. Weaponizing Everyday Devices: The "Internet of Bombs"
Source: https://asiatimes.com/2024/09/the-weaponization-of-everything-has-begun/
The 2024 pager and walkie-talkie explosions in Lebanon are a shocking revelation of the extreme endgame for supply chain attacks.
Overview: Everyday communication devices exploded via remote commands, resulting in over 40 deaths and 3,000 injuries.
The Rise of SDW: This went beyond cyber-attacks; it marked the emergence of SDW (Software-Defined Weapons), where the device itself becomes the bomb through supply chain compromise.
Why it matters:
The fact that consumer electronics can be weaponized signals a fundamental breakdown in the global trust of the supply chain.
Conclusion: QAAS is an Environment, Not Just an Incident
The common thread among these four cases—network hijacking, femtocell cloning, deepfake fraud, and device explosions—is clear: QAAS is a multi-layered attack structure.
Quantum: Neutralizing encryption.
AI: Automating attacks and mastering social engineering.
APT: Long-term infiltration and system takeover.
Supply Chain: Destroying the integrity of hardware and firmware.
In an environment where these elements combine, legacy security paradigms are no longer valid. We have reached a point where we need a philosophical shift in security architecture, not just a simple combination of technologies.
๐ Next: we will take a deep dive into the PAZI (Post-Quantum + AI + Zero Trust + Identity) model—the only viable alternative in the QAAS era.
CMO(Chief Marketing Officer), ICTK
CTO(Chief Technical Officer), ICTK
Director, Cisco Systems Korea
Developer, SK Teletech
Read more