Article Details
Scrape Timestamp (UTC): 2024-11-13 22:36:35.082
Original Article Text
Click to Toggle View
US govt officials’ communications compromised in recent telecom hack. CISA and the FBI confirmed that Chinese hackers compromised the "private communications" of a "limited number" of government officials after breaching multiple U.S. broadband providers' networks. The attackers also stole other information from the companies' compromised systems, including information related to customer call records and law enforcement requests. "Specifically, we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data," the two agencies said in a joint statement issued on Wednesday. They added that the attackers also compromised the "private communications of a limited number of individuals who are primarily involved in government or political activity" and stole "certain information that was subject to U.S. law enforcement requests pursuant to court orders." This comes after CISA and the FBI confirmed the hack in late October after reports that a Chinese hacking group tracked as Salt Typhoon (aka Earth Estries, FamousSparrow, Ghost Emperor, and UNC2286) breached multiple broadband providers, including AT&T, Verizon, and Lumen Technologies. Today's joint statement also confirms reports that the threat group had access to U.S. federal government systems used for court-authorized network wiretapping requests. Hackers reportedly maintained access for months While it's unknown when the telecom networks were first breached, people familiar with the matter told WSJ that the Chinese hackers had access "for months or longer," which allowed them to collect vast amounts of "internet traffic from internet service providers that count businesses large and small, and millions of Americans, as their customers." Canada also revealed last month that China-backed threat actors targeted many Canadian government agencies and departments in broad network scans, including federal political parties, the Senate, and the House of Commons. "They also targeted dozens of organizations, including democratic institutions, critical infrastructure, the defence sector, media organizations, think tanks and NGOs," the Government of Canada said. Salt Typhoon is a sophisticated hacking group that has been active since at least 2019 and typically focuses on breaching government entities and telecommunications companies in Southeast Asia. In similar yet unrelated attacks, another Chinese threat group tracked as Volt Typhoon hacked multiple ISPs and MSPs in the United States and India after breaching their corporate networks using credentials stolen by exploiting a Versa Director zero-day.
Daily Brief Summary
Chinese hackers, identified as Salt Typhoon, breached multiple U.S. broadband providers, compromising government officials’ private communications.
The attack, confirmed by the FBI and CISA, involved the theft of customer call records and information subject to U.S. law enforcement requests.
Compromised data includes networks used for court-authorized wiretapping, affecting several providers including AT&T, Verizon, and Lumen Technologies.
Hackers maintained prolonged access to telecom networks, potentially for months, gathering substantial internet traffic data affecting millions.
The breach is part of broader hostile activities targeting U.S. and Canadian government agencies, political parties, and critical infrastructure.
Salt Typhoon has been active since at least 2019, primarily targeting governmental and telecommunication entities in Southeast Asia.
In parallel, another group, Volt Typhoon, exploited a zero-day to breach multiple ISPs and MSPs in the U.S. and India, underscoring a continued cyber threat from Chinese linked groups.