HomeSecurity OperationsUS attributes major metadata theft to Chinese hacking group 'Salt Typhoon' |...

US attributes major metadata theft to Chinese hacking group ‘Salt Typhoon’ | Cybersecurity News

Published on

spot_img

Chinese hackers have been implicated in a large-scale cyber-espionage campaign that has targeted a significant number of Americans. Reports indicate that the hackers, known as Salt Typhoon, have successfully stolen metadata belonging to numerous individuals, including senior US government officials and political figures. Despite this breach, officials have reassured the public that classified communications have not been compromised.

During a closed-door briefing with senators, a senior US official revealed that the Chinese government has been actively pursuing a wide range of individuals as part of their ongoing cyber campaign. In addition to targeting American individuals, Salt Typhoon has also set its sights on numerous telecommunications and telecom infrastructure companies worldwide. At least eight US providers have been affected by these cyber-attacks.

This latest breach is not the first instance of alleged Chinese cyber-attacks on US data. In a previous incident, hackers with ties to China targeted then-presidential candidate Donald Trump, his running mate JD Vance, and individuals associated with Vice President Kamala Harris. US officials have also accused Chinese hackers of infiltrating major telecom companies such as Verizon, AT&T, T-Mobile, and Lumen. While T-Mobile has expressed confidence that its customer information remains secure, Lumen has stated that there is no evidence of any customer data being accessed on its network.

In response to the allegations, the Chinese embassy in Washington has vehemently denied any involvement in the cyber-espionage campaign. Embassy spokesperson Liu Pengyu called on the US to cease its own cyber-attacks on foreign nations and urged them to refrain from using cybersecurity as a tool to tarnish China’s reputation.

It is important to note that while call record metadata does not contain the actual content of a call, it can still provide a wealth of information, including details about who a call was placed to, its duration, and its location. When amassed in large quantities, call record metadata can paint a detailed picture of an individual’s life, work, and personal relationships.

To address the growing threat posed by cyber-attacks, a Senate commerce subcommittee is scheduled to convene a hearing on December 11 specifically focusing on Salt Typhoon and the broader security challenges facing communications networks. This latest breach underscores the need for enhanced cybersecurity measures to safeguard sensitive data and protect individuals from malicious cyber actors.

Source link

Latest articles

CISA Issues AI SBOM Guidance for Supply Chain Oversight

In a significant move towards enhancing cybersecurity protocols, the U.S. Cybersecurity and Infrastructure Security...

OrBit Rootkit Targets Linux to Steal SSH and Sudo Credentials

Evolving Cyber Threat: The OrBit Rootkit Continues to Target Linux Systems Cybersecurity researchers have noted...

UK Cyber Sector Grows to £14.7 Billion as Resilience Bill Moves Forward

UK Cybersecurity Sector Shows Robust Growth Amid Rising Threats The cybersecurity sector in the United...

Why Cybersecurity is Now a Business Priority, Not Just an IT Function

Cybersecurity: An Integral Component of Modern Business Operations In an era where digital transformation is...

More like this

CISA Issues AI SBOM Guidance for Supply Chain Oversight

In a significant move towards enhancing cybersecurity protocols, the U.S. Cybersecurity and Infrastructure Security...

OrBit Rootkit Targets Linux to Steal SSH and Sudo Credentials

Evolving Cyber Threat: The OrBit Rootkit Continues to Target Linux Systems Cybersecurity researchers have noted...

UK Cyber Sector Grows to £14.7 Billion as Resilience Bill Moves Forward

UK Cybersecurity Sector Shows Robust Growth Amid Rising Threats The cybersecurity sector in the United...