The U.S. government has confirmed that a ninth telecommunications company has been breached in the ongoing “Salt Typhoon” cyberattack campaign, attributed to Chinese hackers. The campaign, which reportedly began in 2022, has now impacted several major telecom providers, including AT&T, Verizon, and Lumen Technologies. Hackers exploited vulnerabilities in network devices such as routers and firewalls, allowing them persistent access to sensitive communications data. This breach has raised significant concerns about privacy and national security.
The hackers gained access to vast amounts of metadata, including phone call and text message details, exposing the communication patterns of millions of individuals. In some cases, the actual content of these communications was also intercepted. The U.S. government confirmed that high-ranking officials, including political leaders, were targeted, although classified communications remained secure. This highlights the scale and sophistication of the attack, which is designed to facilitate espionage and intelligence gathering.
In addition to impacting government officials, the attack has compromised critical systems used for law enforcement surveillance, further complicating the situation. The breach has allowed hackers to track individuals’ locations and monitor communications, potentially jeopardizing sensitive counterintelligence operations. While the number of individuals directly targeted was reportedly fewer than 100, the overall impact on privacy and security has been profound.
In response, U.S. authorities are taking steps to bolster telecom security. The Federal Communications Commission (FCC) is being urged to implement stronger cybersecurity regulations for phone carriers, moving beyond voluntary practices that have proven ineffective against such sophisticated threats. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) are working closely with telecom companies to improve security measures and prevent future attacks. This breach underscores the need for more robust cybersecurity practices to defend against nation-state actors targeting critical infrastructure.