Curated Content | Thought Leadership | Technology News

Chinese Hackers Compromise Verizon and AT&T in High-Stakes Intrusion

Telecom targeted.
Cambron Kelly
Contributing Writer
Capitol building in Washington DC

Chinese hackers have successfully breached several major U.S. telecommunications companies, including Verizon, AT&T, and Lumen, in what appears to be a complex counterintelligence operation. U.S. officials believe the group responsible, dubbed Salt Typhoon, is connected to China’s Ministry of State Security (MSS), raising concerns about the extent of the intrusion.

The FBI, Homeland Security, and U.S. intelligence agencies are investigating the breach, which likely aimed to uncover the identities of Chinese targets under U.S. surveillance.

The hackers reportedly gained deep access to networks, raising fears that sensitive information, such as federal surveillance targets, may have been compromised. The full scope of the breach is still under review.

Why It Matters: The breach into critical U.S. telecommunications infrastructure represents a serious national security threat, as hackers may have gained access to sensitive government surveillance data. Access to federal surveillance data could enable Chinese hackers to undermine critical intelligence efforts or feed disinformation. With the hackers’ penetration into major communication networks, the incident exposes vulnerabilities in U.S. telecom infrastructure.

  • Scope of the Breach: The hack affected major U.S. telecom providers, including AT&T, Verizon, and Lumen, with the hackers maintaining access for several months. Investigations are ongoing to determine the full extent of the compromise and the information exfiltrated.
  • Telecom Providers Targeted: The attackers gained deep access to sensitive systems, exploiting vulnerabilities in network routers, with a potential reach into general internet traffic and federal wiretap data.
  • Salt Typhoon’s Sophisticated Methods: The Chinese group, Salt Typhoon, reconfigured key telecommunications infrastructure, such as Cisco routers, to evade detection, demonstrating advanced capabilities that alarm cybersecurity experts.
  • Beijing’s Role Denied: Chinese officials have dismissed the accusations, claiming that the U.S. intelligence community is fabricating evidence to secure funding and contracts. However, previous instances of Chinese cyber espionage against U.S. entities lend credibility to these claims.
  • Broader Espionage Context: The hack is part of a broader espionage campaign attributed to China, with Salt Typhoon being linked to the MSS. This follows similar campaigns, such as the Volt Typhoon intrusions into U.S. critical infrastructure, highlighting an ongoing cyber conflict between the two powers.

Go Deeper -> China hacked major U.S. telecom firms in apparent counterspy operation – The Washington Post

U.S. Officials Race to Understand Severity of China’s Salt Typhoon Hacks – WSJ Cybersecurity

☀️ Subscribe to the Early Morning Byte! Begin your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

☀️ Your latest edition of the Early Morning Byte is here! Kickstart your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

ADVERTISEMENT

×
You have free article(s) left this month courtesy of CIO Partners.

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Would You Like To Save Articles?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Thanks for subscribing!

We’re excited to have you on board. Stay tuned for the latest technology news delivered straight to your inbox.

Save My Spot For TNCR LIVE!

Thursday April 18th

9 AM Pacific / 11 PM Central / 12 PM Eastern

Register for Unlimited Access

Already a member?

Digital Monthly

$12.00/ month

Billed Monthly

Digital Annual

$10.00/ month

Billed Annually

Would You Like To Save Books?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Log In To Access Premium Features

Sign Up For A Free Account

Please enable JavaScript in your browser to complete this form.
Name
Newsletters