US Telecoms Customer Data Stolen By Chinese Hackers 

The US has been suffering a growing number of large-scale cyber attacks, apparently conducted by Chinese stare-sponsored hackers, with links to or directed by, China’s national intelligence agencies. Indeed, leaders of the top US telecommunications companies were recently called to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

Now, a large amount of  US telecoms companies' customer metadata has been stolen in the sweeping  espionage campaign carried out by a group being called Salt Typhoon. Although specific details are unavailable, according to reports, the hackers gained widespread access to US national telecommunications infrastructure, including several leading broadband providers. 

The US cyber defence agencies, CISA, the National Security Agency (NSA), and Federal Bureau of Investigation (FBI) have confirmed that Chinese  state-sponsored cyber actors have compromised the IT environments of multiple critical infrastructure organisations. This breach is not an isolated event but part of a broader strategy to disrupt and weaken America’s operational capabilities in the event of conflict. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure.

It is thought that the hacking group known as Salt Typhoon, operating under Chinese direction, infiltrated US Internet providers and has been gaining access to systems essential to the US national security. "We believe a large number of Americans' metadata was taken," said an official, who spoke to reporters on condition of anonymity. "We do not believe it's every cell phone in the country, but we believe it's potentially a large number of individuals that the Chinese government was focused on." the official said.

Dozens of companies across the world had been hit by the hackers, including at least eight  US telecommunications and telecom infrastructure firms 

The official said the White House had made tackling the Salt Typhoon hackers a priority for the federal government and that outgoing President Joe Biden had been briefed several times on the intrusions. 

The current cyber-attacks are a important clarion call that network security must be both a forethought in network design and an ongoing regulatory responsibility for the agency entrusted with oversight of the nation’s networks.

CISA   |   Reuters   |   Oodaloop   |   NYTimes   |   Brookings Inst.   |   Industrial Cyber   |   Guardian   | 

Guardian   

Image: XstockImages

You Might Also Read:   

Chinese Hackers Target Japan & EU:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Microsoft Faces £1bn Lawsuit For Cloud Licencing Damages
Romanian Presidential Election Undermined By Russia »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Sixteenth Air Force (Air Forces Cyber) - USA

Sixteenth Air Force (Air Forces Cyber) - USA

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Telcion Communications Group

Telcion Communications Group

Telcion Communications Group provides communication and IT solutions to businesses and organizations throughout California and neighbouring states.