Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data

A Chinese hacking campaign, codenamed “Salt Typhoon” by Microsoft, has infiltrated more than 8 American telecommunications companies, stealing vast amounts of U.S. citizens’ phone data.

Officials describe it as one of the largest intelligence compromises in U.S. history.

The operation, significantly larger than previously known to the public, has affected dozens of countries worldwide and compromised the communications of a large number of Americans.

The cyberespionage campaign has given hackers access to multiple types of information:-

  1. Call records and metadata, particularly focusing on the Washington, D.C. area
  2. Live phone calls of specific targets
  3. Systems used for law enforcement and intelligence agency access (CALEA systems)

While besides this, the analyst at NBC News noted that among the known victims are the presidential campaigns of Donald Trump and Kamala Harris, as well as the office of Senate Majority Leader Chuck Schumer.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Government Response

Anne Neuberger, a deputy national security adviser, stated that the U.S. does not believe any of the affected telecoms have fully removed the hackers from their systems. This persistent threat poses a risk of ongoing compromises to communications until cybersecurity gaps are addressed.

U.S. officials, along with allies from Australia, Canada, and New Zealand, have released a public guide for telecommunications companies to protect themselves from Chinese hackers. The FBI is in the process of notifying Americans whose calls they believe were compromised, although not all affected individuals will be contacted.

In light of this unprecedented cyberattack, U.S. officials are urging Americans to take precautions:-

  • Use encrypted messaging apps for communications
  • Consider using cellphones that receive timely operating system updates
  • Implement responsibly managed encryption
  • Use phishing-resistant multi-factor authentication for email, social media, and collaboration tools

While China frequently denies responsibility for cyberattacks, the U.S. views this campaign as a massive but traditional espionage operation aimed at gathering intelligence on American politics and government.

The compromise has raised concerns about the vulnerability of telecommunications infrastructure and the need for enhanced cybersecurity measures globally.

The incident underscores the critical importance of robust cybersecurity practices and the ongoing challenges in protecting sensitive data in an increasingly interconnected world.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

The post Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data appeared first on Cyber Security News.

About Author

Chad Barr

Chad Barr is a visionary and executive leader, blending over two decades of expertise with a unique ability to demystify complex technical concepts. As a cybersecurity leader, prolific author, and director at AccessIT Group, Chad has empowered organizations across diverse industries to build resilient security frameworks. His engaging writing, speaking engagements, and thought leadership inspire proactive cybersecurity practices, making him a trusted voice in the ever-evolving digital landscape.

My Books

Cybersecurity News

  • Palo Alto Networks Expedition Tool Vulnerability Exposes Firewall Credentials
    by Guru Baran on January 9, 2025 at 7:24 am

    Multiple vulnerabilities in Palo Alto Networks’ Expedition migration tool have been discovered, potentially exposing sensitive firewall credentials, including usernames, cleartext passwords, device configurations, and API keys. These vulnerabilities pose significant risks to organizations using the tool for firewall migration and optimization. Expedition, formerly known as the Migration Tool, is a free utility designed to assist The post Palo Alto Networks Expedition Tool Vulnerability Exposes Firewall Credentials appeared first on Cyber Security News.

  • E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws
    by [email protected] (The Hacker News) on January 9, 2025 at 7:13 am

    The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc’s own data privacy regulations. The development marks the first time the Commission has been held liable for infringing stringent data protection laws in the region. The court determined that

  • Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure
    by [email protected] (The Hacker News) on January 9, 2025 at 7:13 am

    Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning mid-December 2024. The security vulnerability in question is CVE-2025-0282 (CVSS score: 9.0), a stack-based buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2

  • Hackers Actively Exploited Ivanti VPN 0-Day Vulnerability (CVE-2025-0282): Technical Analysis
    by Balaji N on January 9, 2025 at 4:52 am

    Ivanti publicly disclosed two critical vulnerabilities CVE-2025-0282 and CVE-2025-0283 affecting its Connect Secure (ICS) VPN appliances. The announcement comes amidst alarming reports of active zero-day exploitation of CVE-2025-0282, identified by cybersecurity firm Mandiant as having begun in mid-December 2024. The exploitation has raised concerns about potential network breaches and downstream compromises for affected organizations. CVE-2025-0282, The post Hackers Actively Exploited Ivanti VPN 0-Day Vulnerability (CVE-2025-0282): Technical Analysis appeared first on Cyber Security News.

  • Wireshark 4.4.3 Released – What’s New!
    by Guru Baran on January 9, 2025 at 2:51 am

    The Wireshark Foundation has announced the release of Wireshark 4.4.3, the latest version of the world’s most popular network protocol analyzer. This update brings a host of bug fixes and protocol support improvements, enhancing the tool’s capabilities for network troubleshooting, analysis, development, and education. What is Wireshark? Wireshark is a powerful, open-source network analysis tool The post Wireshark 4.4.3 Released – What’s New! appeared first on Cyber Security News.

Categories