Speaking at GTBA 2025: Ransomware Threats in Telecom and Broadband

1720900008538

We're pleased to share that Patrick Kelley, CEO of Critical Path Security and Léargas Security, will be speaking at the 2025 GTBA Annual Meeting of the Membership, hosted by the Georgia Rural Telephone and Broadband Association.

📍 Location: Hammock Beach, Daytona Beach, FL
📅 Dates: June 15–19, 2025
🗣 Topic: Ransomware in Telecom and Broadband: Real-World Impact and Response Strategies


Why This Talk Matters

Rural telecommunications and broadband providers have become prime targets for ransomware groups seeking to exploit infrastructure gaps and critical service dependencies. As attackers refine their tactics—often hitting operations where recovery is slow and costly—preparedness is no longer optional.

Patrick will dive into the latest ransomware attack trends, walk through recent case studies, and outline actionable steps for detection, response, and prevention tailored for rural ISPs and telcos.


What Attendees Will Gain

  • A clearer understanding of ransomware attack vectors in telecom infrastructure
  • Guidance on securing legacy and modern broadband systems
  • Tips for building layered defenses without breaking the budget
  • Real-world examples of ransomware playbooks and how to counter them
  • Discussion on insurance, legal pressure, and operational resilience

Who's Behind the Attacks?

Several nation-state and cybercriminal groups have increasingly targeted the telecom and broadband sector:

  • VOLT TYPHON (aka FIN12/Wizard Spider): Known for high-speed ransomware operations (Ryuk, Conti) following phishing or compromised RDP. They often exploit soft targets that still deliver high-impact service disruption.
  • VOLT KAPPA (aka Sandworm/TeleBots): Notorious for disruptive attacks like NotPetya. Their recent use of tools like Prestige ransomware or Raspberry Robin makes them a concern for any org running legacy OT/ICS assets.
  • LockBit 3.0: Targets managed service providers and broadband infrastructure in double-extortion campaigns.
  • ALPHV/BlackCat: Focused on supply chain attacks with an eye toward telecom and SaaS providers.
  • Scattered Spider (VOLT KOBALT): Uses advanced social engineering and SIM-swapping to compromise telecom-linked identity platforms.

If you work in rural broadband or telecom and want to get ahead of the next threat wave, don’t miss this session.

Stay tuned for the full GTBA agenda, and we look forward to connecting with industry peers at Hammock Beach.