Trump / Vance Campaign A Target For Attacks From China
The US Government is investigating the unauthorised access to commercial telecommunication by a Chinese group known as Salt Typhoon, a known Chinese cyber espionage group.
According to sources, the the Trump-Vance campaign had been alerted to the fact that telephones phones used by both US Presidential candidates may have been amongst those targeted.
Staff working for the Harris-Walz campaign were also apparently targeted, along with staff of the Senate Leader, although it remain unclear what information, might have been accessed.
In a statement the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) said the US government was investigating the "unauthorised access to commercial telecommunications infrastructure by actors affiliated with the People's Republic of China". CISA's statement says it identified "malicious activity" and the agency "immediately notified affected companies, rendered technical assistance, and rapidly shared information to assist other potential victims", adding that the investigation was ongoing.
"Agencies across the US government are collaborating to aggressively mitigate this threat and are coordinating with our industry partners to strengthen cyber defences across the commercial communications sector," according to CISA.
The Trump campaign has already been the target of hacking when earlier in 2024 three Iranians nationals were charged in September with deliberately attempting to undermine a presidential campaign.
CISA | BBC | CBS | HongKongFP | New York Times | NBC | Axios
Image: allison saeng
You Might Also Read:
2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors:
If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.
- Individual £5 per month or £50 per year. Sign Up
- Multi-User, Corporate & Library Accounts Available on Request
- Inquiries: Contact Cyber Security Intelligence
Cyber Security Intelligence: Captured Organised & Accessible