Comment by lxgr
> if the pager network was compromised, thus burns the compromised network
I wouldn't necessarily call this type of attack a network compromise. All it takes is knowing the target phone numbers and sending a specific message, which is a paging network working exactly as designed. Phone detonated bombs have been a thing for a long time too.
Calling it a hardware supply chain attack seems more accurate.