Curated Content | Thought Leadership | Technology News

U.S. Officials Sound the Alarm on Persistent Telecom Hacks Linked to China

Safeguard your critical conversations.
Ryan Uliss
Contributing Writer
Miniatures on smart phone with chain lock,abstract background for solution to security smart phone form not owner.

As an unprecedented cyberattack continues to target U.S. telecommunications companies, federal officials are urging Americans to adopt encrypted messaging apps to safeguard their communications.

The campaign, dubbed Salt Typhoon, is a massive espionage operation attributed to Chinese hackers. The breach has compromised sensitive data from telecom giants like AT&T, Verizon, T-Mobile, and Lumen Technologies, exposing critical vulnerabilities in the nation’s infrastructure.

Despite ongoing efforts to root out the hackers, officials admit it’s “impossible to predict” when the systems will be fully secure.

Scope and Impact

Salt Typhoon represents one of the most significant intelligence compromises in U.S. history, targeting key telecom infrastructure to access metadata, live calls, and law enforcement systems.

Metadata includes detailed records of phone call times, durations, and recipients, with a particular focus on the Washington, D.C., area. Live phone calls and CALEA systems—used for lawful surveillance under classified court orders—were also breached. This has raised concerns about the security of highly sensitive information, including intelligence investigations.

Jeff Greene, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), highlighted the extensive nature of the breach, stating, “It’s impossible to predict a time frame on when we’ll have full eviction.”

Greene’s remarks underline the immense challenge of eliminating such sophisticated intrusions and preventing their recurrence.

Encrypted Messaging Encouraged

To counter the risks posed by Salt Typhoon, U.S. officials recommend the widespread use of encrypted messaging apps.

Apps like Signal, WhatsApp, and iMessage provide end-to-end encryption, ensuring that intercepted data remains unreadable. Greene reinforced this approach, saying, “Encryption is your friend, whether it’s on text messaging or if you have the capacity to use encrypted voice communication. Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible.”

Beyond messaging, the FBI advises the use of devices with timely operating system updates and phishing-resistant multi-factor authentication. These measures can provide additional layers of security, particularly against espionage campaigns targeting individuals in government and politics.

Espionage on an Unprecedented Scale

The Salt Typhoon operation appears to be a large-scale espionage campaign rather than an effort to disrupt elections. Its targets included individuals in government, political campaigns, and other high-profile roles.

FBI officials believe the operation reflects traditional intelligence gathering on a massive scale, with attackers exploiting telecom networks to gain deep access to Americans’ private data.

The implications extend beyond the immediate victims. Senator Ron Wyden criticized the reliance on outdated systems like CALEA, which leave sensitive information unencrypted and vulnerable. He warned that when companies like AT&T or Verizon are inevitably hacked, adversaries like China gain access to critical communications, emphasizing the need for stronger systemic protections.

The Wrap

Salt Typhoon serves as a stark reminder of the vulnerabilities within the U.S. telecommunications system and the growing threat of cyber espionage.

While encrypted messaging apps offer an essential defense, they are just one piece of a broader security puzzle. As Greene noted, “We don’t have any illusion that once we kick off these actors, they’re not going to come back.” To protect critical infrastructure and personal communications, CISA emphasizes the importance of individuals, organizations, and governments adopting proactive cybersecurity measures.

By embracing encryption and staying vigilant against evolving threats, Americans can take meaningful steps to protect their data in an increasingly interconnected and targeted world.

Go Deeper -> U.S. Officials Urge Americans to Use Encrypted Apps Amid Unprecedented Cyberattack – NBC News

FBI Tells Telecom Firms to Boost Security Following Wide-Ranging Chinese Hacking Campaign – AP News

Enhanced Visibility and Hardening Guidance for Communications Infrastructure – CISA

☀️ Subscribe to the Early Morning Byte! Begin your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

☀️ Your latest edition of the Early Morning Byte is here! Kickstart your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

ADVERTISEMENT

×
You have free article(s) left this month courtesy of CIO Partners.

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Would You Like To Save Articles?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Thanks for subscribing!

We’re excited to have you on board. Stay tuned for the latest technology news delivered straight to your inbox.

Save My Spot For TNCR LIVE!

Thursday April 18th

9 AM Pacific / 11 PM Central / 12 PM Eastern

Register for Unlimited Access

Already a member?

Digital Monthly

$12.00/ month

Billed Monthly

Digital Annual

$10.00/ month

Billed Annually

Would You Like To Save Books?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Log In To Access Premium Features

Sign Up For A Free Account

Please enable JavaScript in your browser to complete this form.
Name
Newsletters