FBI Confirms: China Got Into Phones Of U.S. Politicians

Man

Professional
Messages
3,046
Reaction score
570
Points
113
The operation lasted for months until its traces were discovered by the special services.

A major U.S. data breach linked to Chinese cyber spies continues to gain momentum, pointing to serious problems in the country's counterintelligence industry.

In early October, the first reports of hacks affecting the infrastructure of leading telecom operators such as Verizon, AT&T and Lumen Technologies, as well as some carriers from allied countries, were published. These attacks are linked to the Chinese cyberespionage group Salt Typhoon, identified by Microsoft.

According to sources familiar with the investigation, the hackers managed to intercept phone conversations and text messages, including from high-ranking officials responsible for national security and US policy issues.

The United States has confirmed the attacks. The Federal Bureau of Investigation and the Cybersecurity and Infrastructure Protection Agency said they are investigating and working to reduce the threat posed by unauthorized access to American telecommunications infrastructure.

On October 8, the White House formed a group to coordinate actions in response to the attack, based on a directive signed by Barack Obama in 2016. This group is the fourth in a row created to deal with critical cybersecurity incidents. Previously, similar groups were created to respond to attacks on Microsoft Exchange and SolarWinds.

The Cybersecurity Council, established by Joe Biden in 2021, will also consider this incident. This body was created by analogy with the National Transportation Safety Board, and its task is to investigate significant cyberattacks.

Microsoft applies codenames to Chinese hacker groups, including Salt Typhoon, Volt Typhoon, and Flax Typhoon. These groups target U.S. and allied critical infrastructure so that they can destabilize it in the event of a conflict.

American intelligence notes that China is the most active and persistent cyber threat to the United States, seeking to influence the country's critical infrastructure and strategic decisions as much as possible.

Source
 
Top