US Telecoms Customer Data Stolen By Chinese Hackers 

The US has been suffering a growing number of large-scale cyber attacks, apparently conducted by Chinese stare-sponsored hackers, with links to or directed by, China’s national intelligence agencies. Indeed, leaders of the top US telecommunications companies were recently called to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

Now, a large amount of  US telecoms companies' customer metadata has been stolen in the sweeping  espionage campaign carried out by a group being called Salt Typhoon. Although specific details are unavailable, according to reports, the hackers gained widespread access to US national telecommunications infrastructure, including several leading broadband providers. 

The US cyber defence agencies, CISA, the National Security Agency (NSA), and Federal Bureau of Investigation (FBI) have confirmed that Chinese  state-sponsored cyber actors have compromised the IT environments of multiple critical infrastructure organisations. This breach is not an isolated event but part of a broader strategy to disrupt and weaken America’s operational capabilities in the event of conflict. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure.

It is thought that the hacking group known as Salt Typhoon, operating under Chinese direction, infiltrated US Internet providers and has been gaining access to systems essential to the US national security. "We believe a large number of Americans' metadata was taken," said an official, who spoke to reporters on condition of anonymity. "We do not believe it's every cell phone in the country, but we believe it's potentially a large number of individuals that the Chinese government was focused on." the official said.

Dozens of companies across the world had been hit by the hackers, including at least eight  US telecommunications and telecom infrastructure firms 

The official said the White House had made tackling the Salt Typhoon hackers a priority for the federal government and that outgoing President Joe Biden had been briefed several times on the intrusions. 

The current cyber-attacks are a important clarion call that network security must be both a forethought in network design and an ongoing regulatory responsibility for the agency entrusted with oversight of the nation’s networks.

CISA   |   Reuters   |   Oodaloop   |   NYTimes   |   Brookings Inst.   |   Industrial Cyber   |   Guardian   | 

Guardian   

Image: XstockImages

You Might Also Read:   

Chinese Hackers Target Japan & EU:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Microsoft Faces £1bn Lawsuit For Cloud Licencing Damages
Romanian Presidential Election Undermined By Russia »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

White Knight Labs

White Knight Labs

White Knight Labs is a cyber security consultancy that specializes in cybersecurity training.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

Cyberspatial

Cyberspatial

Cyberspatial Teleseer - Discover and map your network in minutes. Next-gen packet analysis and network visualization. All from your web browser.