• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Sci-Fi

What is Salt Typhoon? Everything you need to know about ‘the worst telecom hack in [U.S.] history’

December 6, 2024
Share on FacebookShare on Twitter

In today’s age of digital everything, it seems hardly a day goes by without news of a new cybersecurity threat. Unfortunately, the ongoing Salt Typhoon hack is much larger and more serious than your average breach. Senate Intelligence Committee chairman Senator Mark R. Warner even labelled the Salt Typhoon attack the “worst telecom hack in [U.S.] history by far,” the hackers gaining access to numerous Americans’ data and monitoring political targets’ communications for years.

Here’s everything you need to know about the 2024 Salt Typhoon hack.

SEE ALSO:

Hackers are now sending scam QR codes via physical mail — and they can steal your passwords

What is Salt Typhoon?

Salt Typhoon is a hacking group which is reportedly sponsored by the Chinese government. Active since 2020, the group has carried out attacks against targets in the U.S. as well as globally.

The group typically uses advanced persistent threat (APT) attacks, covertly gaining access to targeted networks and remaining there undetected for a lengthy period of time. Such methods allow attackers to gather extensive information about their targeted organisation.

Though commonly referred to as Salt Typhoon, the group has also been dubbed GhostEmperor, FamousSparrow, Earth Estries, and UNC2286. The name “Salt Typhoon” was given to it by Microsoft, which uses “Typhoon” to label all nation-state threat actors from China.

What is the Salt Typhoon telecom hack?

On Wednesday, the U.S. government disclosed that at least eight telecommunications companies have been infiltrated by Salt Typhoon’s hackers, following reports emerging earlier this year of a state-sponsored Chinese cyberattack on internet service providers.

The 2024 Salt Typhoon hack is believed to have actually been ongoing for one or two years, and remains active even now, with Salt Typhoon allegedly still able to access many telecommunication systems. While officials are working on ridding systems of the intruders, the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) has said it is “impossible” to tell when all the hackers will be completely evicted.

According to U.S. officials, the Salt Typhoon hack is an espionage campaign sponsored by Chinese authorities. The Chinese government has denied any involvement in the cyberattacks.

“The U.S. needs to stop its own cyberattacks against other countries and refrain from using cyber security to smear and slander China,” a spokesperson from China’s embassy in Washington said in a statement to the Associated Press.

Mashable Light Speed

Which U.S. telecoms are impacted by the Salt Typhoon hack?

A full list of organisations impacted by the Salt Typhoon hack has not been released, however we do know that the campaign targeted telecommunications companies across the globe. Anne Neuberger, U.S. Deputy National Security Advisor for Cyber and Emerging Tech, stated on Wednesday that “dozens of countries” have been affected, with the U.S., Canada, Australia, and New Zealand all confirmed targets.

In the U.S., Salt Typhoon allegedly breached at least eight telecommunications companies. The Wall Street Journal reports that this list includes:

  • Verizon

  • AT&T

  • T-Mobile

  • Lumen Technologies

Am I impacted by the Salt Typhoon hack?

U.S. officials stated that while they believe the Salt Typhoon hack did not affect every American, it has impacted “a large number” of people, most of whom were located in the greater Washington area. The hackers reportedly accessed these individuals’ metadata, such as records of numbers which had contacted each other, but not the content of such communications.

On its own merit, most of this compromised metadata appears to be of little interest to Salt Typhoon. Instead, the hackers are believed to have used such information to identify the communications of particular targeted individuals. Salt Typhoon is alleged to have been searching for corporate intellectual property as well as specific government and political targets, which reportedly included Donald Trump, Senator J.D. Vance, and people from within both Trump and Kamala Harris’ presidential campaigns.

Upon identifying them, the hackers focused on accessing these individuals’ communications, reading texts and listening in to audio calls. As of November, approximately 150 individual targets had been identified and notified, most of them within the Washington, D.C. area.

“The actors stole a large volume of records, including data on where, when, and with whom individuals were communicating,” a Federal Bureau of Investigation (FBI) official told the Washington Post.

Salt Typhoon’s hackers reportedly also accessed the U.S. law enforcement’s system for requesting wiretaps. Though officials told the Washington Post that there’s no evidence the hackers were able to listen in on the network, they may have been able to identify individuals the U.S. government is investigating.

The full scope of the Salt Typhoon hack still isn’t entirely clear. Fortunately, Neuberger has stated that no classified information is believed to have been compromised.

How is the U.S. government responding to the Salt Typhoon hack?


Tweet may have been deleted

Following nows of the Salt Typhoon cyberattack, the U.S. Federal Communications Commission (FCC) has said it is “taking decisive steps to address vulnerabilities in U.S. telecommunications network.” 

Specifically, the FCC has proposed clarifying laws which require telecommunications companies to secure their networks against hackers. This would make clear that such security measures not only include equipment, but also how the telecommunications carriers manage their networks.

The FCC has also proposed a new annual certification requirement for telecommunications companies, including certified compliance with new cybersecurity risk management plans.

“While the Commission’s counterparts in the intelligence community are determining the scope and impact of the Salt Typhoon attack, we need to put in place a modern framework to help companies secure their networks and better prevent and respond to cyberattacks in the future,” said FCC Chairwoman Jessica Rosenworcel.

A Senate Commerce subcommittee will hold a hearing on the Salt Typhoon hack on Dec. 11 to examine security threats and protective measures.

Next Post

Here's a good look at the leaked app

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Google’s Pixel 10a might have the same processor, but it has one advantage
  • Resident Evil Village Gold Edition Review – Twisted Voxel
  • I tested the JLab giant headphone speakers. I have opinions!
  • Chrome still doesn’t have extensions on Android, so I found a browser that does
  • Pokémon TCG First Partner Illustration Collection preorders — buy now for under $70 at Amazon

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously