HomeCyber BalkansChinese Hackers Penetrated US Telecom Networks to Monitor Calls and Text Messages

Chinese Hackers Penetrated US Telecom Networks to Monitor Calls and Text Messages

Published on

spot_img

In what officials are deeming the most severe breach in U.S. history, Chinese hackers successfully infiltrated the country’s telecommunications systems, granting them access to monitor phone conversations and read text messages through exploiting outdated equipment and weaknesses in network connections. The extent of this intrusion has left investigators scrambling to fully comprehend the scope of the attack.

Senator Mark Warner, who serves as the chairman of the Senate Intelligence Committee and has a background in the telecommunications industry, expressed grave concern over the vulnerability exposed by the breach. Describing the situation as akin to a barn door left wide open, Warner emphasized the urgency of addressing the ongoing threat posed by the breach.

The hack, attributed to a Chinese intelligence group known as “Salt Typhoon,” was initially detected by Microsoft during the summer of 2024. According to a senior U.S. senator, this breach represents the most significant telecom hack in the nation’s history. The FBI and CISA have reported that Chinese government-linked actors targeted multiple telecom networks, compromising customer call records, intercepting private communications of government and political figures, and accessing data from U.S. law enforcement court orders.

The breach enabled hackers to monitor phone calls and text messages involving key American figures, such as President-elect Donald J. Trump and Vice President-elect JD Vance. While encrypted messaging services like WhatsApp and Signal remained secure, hackers were able to intercept unencrypted communications made over traditional phone networks. The intrusion particularly targeted national security officials, politicians, and their staff, allowing hackers to eavesdrop on specific conversations during specific intervals.

Despite the breach, investigators believe the hackers did not have access to past call recordings but instead collected metadata such as phone numbers, call durations, and location data, providing valuable intelligence. The exploitation of vulnerabilities in aging telecommunications equipment and the interconnections between major carriers like Verizon, AT&T, and T-Mobile facilitated the breach, initially believed to be limited to systems used for court-ordered surveillance but ultimately found to impact all major U.S. telecommunications providers.

The evolution of China’s hacking efforts over the past two decades has transitioned from stealing intellectual property and military blueprints to targeting sensitive government data. While China’s approach has been more covert compared to Russia’s high-profile cyber disruptions, officials now warn of a shift towards deeper and systemic infiltration tactics. Since the breach was uncovered, Chinese hackers have seemingly retreated from U.S. networks, complicating efforts to fully track their activities.

Senator Warner emphasized the importance of ongoing investigations to root out any remaining threats within U.S. networks, highlighting the need for transparency to inform the American public about the severity of the breach. He drew attention to the proactive measures taken by allies like Australia and Britain in implementing cybersecurity standards for their telecommunications systems, urging the U.S. to follow suit and bolster its defenses.

As U.S. officials continue to uncover the extent of the breach, the incident underscores critical vulnerabilities in the nation’s telecommunications infrastructure and raises concerns about the long-term implications of such extensive access by hostile actors. It serves as a sobering reminder of the ongoing cyber threats faced by the country and the need for robust cybersecurity measures to safeguard vital systems and information.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...