U.S. officials have revealed that the Chinese attack on U.S. telecoms has not yet been completely thwarted. Remnants of the group known as Salt Typhoon still linger in telecom firms’ networks across the country and it is difficult to say when all of them will be identified and kicked out.
The attack — which took place in October — led to Chinese hackers breaching multiple companies including AT&T, Verizon and possibly T-Mobile as well. Their goal was to access information on U.S. government officials and they specifically targeted the phones of president elect Donald Trump and vice president elect JD Vance.
In addition the hackers were able to tap into the cellphone lines of some politicians and government workers. They got access to text messages, call logs and bits of call audio from the hacked cellphone lines.
Since the discovery of this group the telecom companies have been working with security officials to expel the intruders from their networks. Jeff Greene — who works for the Cybersecurity Infrastructure and Security Agency — said that the hackers were altering their tactics whenever the media talked about what U.S. officials knew. This makes it very likely that the current report we have is either outdated or missing pieces of the puzzle.
T-Mobile claims it was not breached by Chinese hackers. | Image credit — Bloomberg
Making use of various vulnerabilities these hackers have been able to penetrate deep into U.S. networks. T-Mobile caught suspicious behavior that may have been the same hackers probing its network for any backdoors or oversights in security. The company says it kicked all of the suspicious agents off of its network after verifying the irregular nature of their activities.
This whole ordeal was alarming enough that agencies in other countries are also educating their network engineers on how to recognize Salt Typhoon attacks. U.S. officials claim that Salt Typhoon is acting at the behest of the Chinese government as a direct attack against the country.
If telecom companies and security agencies know how deep into the system these hackers are then they’re staying quiet about it. Greene says they’re still working on figuring that out which may be untrue because they don’t want to reveal that they have the upper hand.
I’m not nearly knowledgeable enough about this as I’d like to be but I do wonder if all of this has anything to do with the fact that telecom companies were using Chinese gear in their networks.
Create a free account and join our vibrant community
Register to enjoy the full PhoneArena experience. Here’s what you get with your PhoneArena account:
Abdullah loves smartphones, Virtual Reality, and audio gear. Though he covers a wide range of news his favorite is always when he gets to talk about the newest VR venture or when Apple sets the industry ablaze with another phenomenal release.
Recommended Stories
Loading Comments...
COMMENT
All comments need to comply with our
Community Guidelines
Phonearena comments rules
A discussion is a place, where people can voice their opinion, no matter if it
is positive, neutral or negative. However, when posting, one must stay true to the topic, and not just share some
random thoughts, which are not directly related to the matter.
Things that are NOT allowed:
Off-topic talk - you must stick to the subject of discussion
Offensive, hate speech - if you want to say something, say it politely
Spam/Advertisements - these posts are deleted
Multiple accounts - one person can have only one account
Impersonations and offensive nicknames - these accounts get banned
Moderation is done by humans. We try to be as objective as possible and moderate with zero bias. If you think a
post should be moderated - please, report it.
Have a question about the rules or why you have been moderated/limited/banned? Please,
contact us.
Things that are NOT allowed: