Lumen, a prominent U.S. internet provider that owns CenturyLink and Quantum Fiber, was recently targeted by the Salt Typhoon cyberattack, which is attributed to Chinese government-linked hackers. The breach is part of a broader series of cyberattacks involving major internet service providers (ISPs) like AT&T and Verizon. This attack has raised alarm due to its use of the same systems employed by federal authorities for wiretapping court-ordered communications. As investigations into the attack continue, it remains unclear just how extensive the damage is, but it’s clear that millions of customers may have been affected.
Cybersecurity experts are highlighting the seriousness of this attack, describing it as one of the most complicated and bold operations a nation-state actor can execute. The compromised systems contain sensitive data that could potentially involve intelligence and law enforcement operations. Given that the hack affected ISPs, which manage critical communications infrastructure, the impact could be widespread, compromising both private sector and government data. The Salt Typhoon breach comes on the heels of the FBI’s takedown of another Chinese-backed attack, Flax Typhoon, which impacted a network of internet-connected devices.
This series of cyberattacks underscores the increasing sophistication and scale of China’s hacking operations, which have expanded rapidly in recent years. Intelligence officials have expressed growing concerns about the vast capabilities of Chinese cyber espionage programs, noting that China’s hacking efforts surpass those of any other nation. With the increasing digitization of global infrastructure, these attacks raise critical questions about the vulnerabilities inherent in critical communication and security systems.
Despite the mounting evidence linking the Chinese government to these operations, China has denied involvement in the Salt Typhoon attack. A spokesman for the Chinese embassy in Washington, Liu Pengyu, dismissed claims as unfounded, accusing U.S. intelligence agencies of fabricating evidence. This diplomatic dispute adds another layer of complexity to the international response to these high-profile cyberattacks, which continue to shape the global cybersecurity landscape.
Reference: