HomeSecurity OperationsUS attributes major metadata theft to Chinese hacking group 'Salt Typhoon' |...

US attributes major metadata theft to Chinese hacking group ‘Salt Typhoon’ | Cybersecurity News

Published on

spot_img

Chinese hackers have been implicated in a large-scale cyber-espionage campaign that has targeted a significant number of Americans. Reports indicate that the hackers, known as Salt Typhoon, have successfully stolen metadata belonging to numerous individuals, including senior US government officials and political figures. Despite this breach, officials have reassured the public that classified communications have not been compromised.

During a closed-door briefing with senators, a senior US official revealed that the Chinese government has been actively pursuing a wide range of individuals as part of their ongoing cyber campaign. In addition to targeting American individuals, Salt Typhoon has also set its sights on numerous telecommunications and telecom infrastructure companies worldwide. At least eight US providers have been affected by these cyber-attacks.

This latest breach is not the first instance of alleged Chinese cyber-attacks on US data. In a previous incident, hackers with ties to China targeted then-presidential candidate Donald Trump, his running mate JD Vance, and individuals associated with Vice President Kamala Harris. US officials have also accused Chinese hackers of infiltrating major telecom companies such as Verizon, AT&T, T-Mobile, and Lumen. While T-Mobile has expressed confidence that its customer information remains secure, Lumen has stated that there is no evidence of any customer data being accessed on its network.

In response to the allegations, the Chinese embassy in Washington has vehemently denied any involvement in the cyber-espionage campaign. Embassy spokesperson Liu Pengyu called on the US to cease its own cyber-attacks on foreign nations and urged them to refrain from using cybersecurity as a tool to tarnish China’s reputation.

It is important to note that while call record metadata does not contain the actual content of a call, it can still provide a wealth of information, including details about who a call was placed to, its duration, and its location. When amassed in large quantities, call record metadata can paint a detailed picture of an individual’s life, work, and personal relationships.

To address the growing threat posed by cyber-attacks, a Senate commerce subcommittee is scheduled to convene a hearing on December 11 specifically focusing on Salt Typhoon and the broader security challenges facing communications networks. This latest breach underscores the need for enhanced cybersecurity measures to safeguard sensitive data and protect individuals from malicious cyber actors.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...