Chinese-Backed Hackers Persist in U.S. Telecom Networks, Officials Urge Use of Encrypted Messaging Apps
U.S. government officials announced on Tuesday that a hacking group backed by China, known as Salt Typhoon, is still active in the networks of major American phone and internet providers. This is happening weeks after the ongoing hacking campaign was first reported.
The Cybersecurity and Infrastructure Security Agency (CISA) shared during a call with reporters that these telecom companies are still working to kick the hackers out. They're facing challenges because it’s unclear what the hackers really want.
In October, news broke that Salt Typhoon had infiltrated the networks of AT&T, Verizon, and Lumen (formerly CenturyLink), among others. T-Mobile mentioned it was targeted too, but they largely managed to fend off the attackers. These hackers gained access to real-time, unencrypted calls and text messages. They could also see metadata, which shows who was communicating with whom as the messages traveled over the carriers’ networks.
U.S. officials think these widespread hacks may be part of a larger Chinese spying operation. The hackers accessed communications from U.S. officials and prominent individuals, including presidential candidates. They are also believed to be targeting systems that handle many of the U.S. government's surveillance requests. This could help them identify Chinese individuals under U.S. government scrutiny.
During the call, representatives from CISA and the FBI urged Americans to use encrypted messaging apps. This is a smart move to protect your communications from being intercepted by Chinese spies or other hacking groups.
“Encryption is your friend,” said a CISA official. “Whether it’s for text messaging or encrypted voice communication.”
Apps like Signal and WhatsApp are popular choices. They offer end-to-end encryption, which means no one— not even the app makers—can access your messages. The U.S. government is also providing guidance to telecom networks on how to strengthen their defenses against these hackers. Each victim company will need tailored remediation strategies based on their specific situations.