Article Details
Scrape Timestamp (UTC): 2024-12-04 23:03:33.993
Original Article Text
Click to Toggle View
White House: Salt Typhoon hacked telcos in dozens of countries. Chinese state hackers, known as Salt Typhoon, have breached telecommunications companies in dozens of countries, President Biden's deputy national security adviser Anne Neuberger said today. During a Wednesday press briefing, the White House official told reporters that these breaches include a total of eight telecom firms in the United States, with only four previously known. While these attacks have been underway for "likely one to two years, "at this time, we don't believe any classified communications have been compromised," Neuberger added, as the Journal first reported. "The Chinese compromised private companies exploiting vulnerabilities in their systems as part of a global Chinese campaign that's affected dozens of countries around the world." "We cannot say with certainty that the adversary has been evicted, because we still don't know the scope of what they're doing. We're still trying to understand that, along with those partners," a senior CISA official said in a Tuesday press call. On Tuesday, CISA and FBI officials advised Americans to switch to encrypted messaging apps to minimize Chinese hackers' chances of intercepting their communications. "Our suggestion, what we have told folks internally, is not new here: Encryption is your friend, whether it’s on text messaging or if you have the capacity to use encrypted voice communication," they said. "Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible." However, T-Mobile's Chief Security Officer, who said last week that the company's systems were breached from a connected wireline provider's network, claims T-Mobile no longer sees any attacker activity within its network. Also tracked as FamousSparrow, Earth Estries, Ghost Emperor, and UNC2286, this state-backed hacking group has been breaching government entities and telecom companies across Southeast Asia since at least 2019. The Salt Typhoon telecom hacks CISA and the FBI confirmed the hacks in late October, following reports that Salt Typhoon had breached the networks of multiple telcos, including T-Mobile, Verizon, AT&T, and Lumen Technologies. The federal agencies later revealed the threat actors compromised the "private communications" of a "limited number" of U.S. government officials, accessed the U.S. government's wiretapping platform, and stole law enforcement request data and customer call records. While the timing of the telecom network breaches is unclear, a Wall Street Journal report says that Chinese hackers had access for "months or longer." This reportedly allowed them to steal substantial internet traffic from internet service providers serving American businesses and millions of customers. On Tuesday, CISA released guidance to help system administrators and engineers managing communications infrastructure to harden their systems against Salt Typhoon attacks. Released with the FBI, the NSA, and international partners, this joint advisory includes tips on hardening network security to shrink the attack surface targeted by the Chinese state hackers, including unpatched devices, vulnerable services exposed to online access, and generally less-secured environments.
Daily Brief Summary
Chinese state-backed hackers, termed as Salt Typhoon, infiltrated telecom companies worldwide, including eight in the U.S., with breaches ongoing for possibly one to two years.
The White House and CISA confirmed the cyber espionage campaign targeted U.S. and international telecommunications, affecting both private and limited government communications.
The attack also breached networks by exploiting system vulnerabilities, leading to interceptions and thefts of vast internet traffic and sensitive data.
T-Mobile, among other major U.S. carriers like Verizon, AT&T, and Lumen Technologies, were compromised, although T-Mobile reports no current attacker activity within its network.
The FBI and CISA have urged the adoption of encrypted messaging solutions effectively to secure communications against potential data interception by these attackers.
Federal agencies have issued comprehensive cybersecurity guidance to system administrators to enhance defenses against such sophisticated attacks, emphasizing the hardening of exposed or unpatched network infrastructure.
Despite ongoing efforts, there is no definitive confirmation that Salt Typhoon has been completely expelled from the penetrated networks, with an uncertain full scope of the intrusion.