Blog


Exploring the future of security — From Hardware Root of Trust to End-to-End Quantum-Safe Protection.


[Insight & Thought Leadership]The Era of QAAS (Part 2): Case Studies of Converged Cyber Threats

BH Kang
24 Dec 2025

In Part 1, we introduced the emergence of QAAS (Quantum-AI-APT-Supply Chain)—a sophisticated convergence of threats—and explored why traditional security paradigms are failing to stop them.

๐Ÿ‘‰ Previous Post: The Era of QAAS (Part 1): Why We Are Facing a "New Age of Threats"

Theory is best proven through reality. In Part 2, we analyze how QAAS threats operate in the real world to dismantle existing security frameworks, using specific cases: the SKT/LGU+ breaches, the KT Femtocell incident, the Arup deepfake fraud, and the Lebanon pager explosions.


1. APT and the Collapse of Authentication: The LGU+ & SKT Breaches

The telecommunications APT breaches are representative cases of the "long-term incubation followed by core authentication theft" pattern. This was not a simple hack; it shook the very foundation of mobile security.


  • Attack Flow: Infiltration via web server vulnerabilities โžก Lateral movement  โžก  Installation of BPFDoor backdoor.

  • Scale of Damage: 23 Linux servers infected, compromising the HSS (Home Subscriber Server)—the core authentication server.

  • Devastating Consequences : Massive theft of 26,957,749 IMSIs (International Mobile Subscriber Identity), 291,831 IMEIs, and most importantly, Ki (Subscriber Authentication Key) values.


Why it matters:

The compromise of Ki values means an attacker can clone USIMs, intercept SMS and calls, and bypass 2FA (Two-Factor Authentication) entirely. This is a classic QAAS pattern: blending APT persistence, authentication penetration, and critical key exfiltration.


2. Supply Chain Subversion: The KT Femtocell Incident

The KT Femtocell case clearly demonstrates how vulnerabilities in the hardware and software supply chain lead to direct financial loss and why supply chain threats are so lethal.


  • The Vulnerability: Authentication keys were software-based (making them clonable), and KT’s policy allowed for Cyphering Fallback, exposing SMS to plain-text interception.

  • The Attack: Attackers deployed approximately 20 illegal femtocells ("Rogue Base Stations"), tricking user devices into connecting to them to steal SMS, IMSI, and IMEI data.

  • Devastating Consequences:  Personal data leak of 22,000 users and over $200,000 in financial damages due to unauthorized micro-payments.


Why it matters:

This incident represents a sophisticated QAAS-style attack where supply chain tampering, authentication weakness, and communication protocol flaws converged to collapse the trust structure of telecom infrastructure.


3. AI Attacks Human Trust: The Arup Deepfake Remittance Fraud


Source: https://fortune.com/europe/2024/05/17/arup-deepfake-fraud-scam-victim-hong-kong-25-million-cfo/ 


Technical vulnerabilities aren't the only issue. The case of the British engineering firm Arup signals an era where AI "hacks" human judgment.

  • Overview: AI-generated deepfakes of company executives attended a video conference. Believing the meeting to be real, an employee transferred approximately $25 million USD.

  • Key Insight: Existing security systems detected absolutely nothing. The essence of the attack was not "technical penetration" of a system, but the destruction of Human Trust.


Why it matters:

This is a stark example showing that AI is no longer just a tool, but an agent capable of executing complex psychological and social engineering attacks.


4. Weaponizing Everyday Devices: The "Internet of Bombs"



Source: https://asiatimes.com/2024/09/the-weaponization-of-everything-has-begun/ 


The 2024 pager and walkie-talkie explosions in Lebanon are a shocking revelation of the extreme endgame for supply chain attacks.

  • Overview: Everyday communication devices exploded via remote commands, resulting in over 40 deaths and 3,000 injuries.

  • The Rise of SDW: This went beyond cyber-attacks; it marked the emergence of SDW (Software-Defined Weapons), where the device itself becomes the bomb through supply chain compromise.


Why it matters:

The fact that consumer electronics can be weaponized signals a fundamental breakdown in the global trust of the supply chain.


Conclusion: QAAS is an Environment, Not Just an Incident

The common thread among these four cases—network hijacking, femtocell cloning, deepfake fraud, and device explosions—is clear: QAAS is a multi-layered attack structure.

  • Quantum: Neutralizing encryption.

  • AI: Automating attacks and mastering social engineering.

  • APT: Long-term infiltration and system takeover.

  • Supply Chain: Destroying the integrity of hardware and firmware.

In an environment where these elements combine, legacy security paradigms are no longer valid. We have reached a point where we need a philosophical shift in security architecture, not just a simple combination of technologies.


๐Ÿ‘‰ Next:  we will take a deep dive into the PAZI (Post-Quantum + AI + Zero Trust + Identity) model—the only viable alternative in the QAAS era.



CMO(Chief Marketing Officer), ICTK

CTO(Chief Technical Officer), ICTK

Director, Cisco Systems Korea 

Developer, SK Teletech




Read more






Copyright โ“’ 2025 ICTK.com. All Rights Reserved.

16, Gangnam-daero 84-gil, Gangnam-gu, Seoul, Republic of Korea (06241)

+82.2.569.0010