Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
More telecom firms were breached by Chinese hackers than previously reported
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Chinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage campaign.This widening infiltration reveals an unprecedented level of exposure for US critical infrastructure and highlights the urgent need for comprehensive cybersecurity reform, reported The Wall Street Journal.Charter, Consolidated, and Windstream Communications did not respond to requests for comment. Salt Typhoon, believed to be tied to Chinese state-sponsored actors, targeted telecommunications firms to access sensitive data, steal intellectual property, and potentially disrupt vital communications networks.Hackers exploited unpatched vulnerabilities in widely used hardware, including Cisco routers and Fortinet devices, allowing them to embed themselves deeply within systems, the WSJ report added.These actions follow earlier revelations that Salt Typhoon attackers had compromised AT&T, Verizon, and Lumen networks to spy on sensitive communications. Verizon had earlier confirmed that a limited number of high-profile targets in government and politics were specifically breached, raising national security alarms.While firms like Lumen and T-Mobile claim to have eradicated active threats, experts warn of lingering vulnerabilities.

National security alarms

Beyond telecom firms, Salt Typhoon poses an even greater threat to US critical infrastructure. A classified briefing led by US National Security Adviser Jake Sullivan last fall warned executives that Chinese hackers have the capability to disable major ports, power grids, and other critical infrastructure at will, the report added.In November last year, Sullivan and Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger convened a meeting with telecommunications executives to share intelligence and discuss the extensive cyber espionage campaign by the People’s Republic of China targeting the industry.In response, FCC Chairwoman Jessica Rosenworcel proposed new regulations to address these vulnerabilities. Under the plan, telecommunications companies must submit annual certifications attesting to the implementation of cybersecurity risk management plans. These measures aim to create a robust framework to combat threats from increasingly sophisticated adversaries.Earlier, the US Consumer Financial Protection Bureau (CFPB) issued a directive prohibiting employees and contractors from using mobile phones for work-related calls. The decision follows a significant breach in the US telecommunications infrastructure, reportedly linked to Chinese hackers.In an internal memo, the CFPB’s Chief Information Officer urged staff to shift sensitive conversations to secure communication platforms such as Microsoft Teams and Cisco WebEx.Just not that, the Salt Typhoon group had also allegedly hacked several major US ISPs for cyber espionage.

Broader implications for US infrastructure

The Salt Typhoon revelations follow a broader pattern of state-sponsored cyber operations targeting the US technology ecosystem. The telecom sector, serving as a backbone for industries including finance, energy, and transportation, remains particularly vulnerable to such attacks.While Chinese officials have dismissed the accusations as disinformation, the recurring breaches underscore the pressing need for international collaboration and policy enforcement to deter future attacks. The Salt Typhoon campaign has uncovered alarming gaps in the cybersecurity of US telecommunications firms, with breaches now extending to over a dozen networks. Federal agencies and private firms must act swiftly to mitigate risks as adversaries continue to evolve their attack strategies. Strengthening oversight, fostering industry-wide collaboration, and investing in advanced defense mechanisms are essential steps toward safeguarding national security and public trust.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3632044/more-telecom-firms-were-breached-by-chinese-hackers-than-previously-reported.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link