Wednesday, December 4, 2024
spot_imgspot_img

Top 5 This Week

spot_img

Related Posts

China’s ‘Salt Typhoon’ Hackers Breached US Networks Using Existing Flaws

China’s Salt Typhoon hacking group is exploiting existing vulnerabilities, not new software flaws, to break into US telecommunication networks, according to federal investigators. 

On Tuesday, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) published an advisory that offers a glimpse into how these state-sponsored cyberspies infiltrated the networks. 

The agencies pointed out: “As of this release date, identified exploitations or compromises associated with these threat actors’ activity align with existing weaknesses associated with victim infrastructure; no novel activity has been observed.” Hence, US cyber officials are urging telecommunication networks to roll out patches to plug holes in their software and equipment. 

Although the advisory stops short of naming any specific vulnerabilities, it says China’s Salt Typhoon group has been targeting “Cisco-specific features” used in the communications sector. The FBI and CISA issued the alert to help US telecommunication companies identify and boot the hackers out amid reports that Salt Typhoon has already breached AT&T, Verizon, T-Mobile, and ISPs to spy on users’ cellphone activities. 

In a Tuesday press briefing, officials with the FBI and CISA said they began investigating the hacks in late spring, which led federal investigators to conclude that Salt Typhoon had compromised multiple telecommunication providers. 

The Chinese hackers were able to spy and intercept phone calls from a group of high-profile US politicians and government staffers. In addition, Salt Typhoon stole a massive amount of records from customers concerning “where, when, and who” they were communicating with, although no voice and text content was lifted, a senior FBI official said.   

But even though about five months have passed since the investigation began, the US still hasn’t uncovered the full scope of the breach. It’s why investigators remain unsure whether the Chinese hackers have been booted out of US telecommunication networks. During the press briefing, FBI and CISA officials noted that China’s Salt Typhoon may have simply gone dormant with the goal of reactivating its access once scrutiny into the breaches dies down.

“Each victim is unique; these are not cookie-cutter compromises in terms of how deeply compromised a victim might be or what the actor has been able to do,” said Jeff Greene, Executive Assistant Director for Cybersecurity at CISA. “It really is case-specific in terms of how to mitigate the specific activity.”

Recommended by Our Editors

Others, such as US Senator Mark Warner (D-Virginia), have warned that Chinese hackers likely remain in US networks and that booting them out will require physically replacing thousands of outdated routers and switches. Greene said that the US government will need to have a conversation about securing domestic telecommunication networks over the long term. 

“It is not the case that we’ve been moving slowly, or we’re sitting on this,” Greene added. “We are very much reliant on our industry partners. That is the same, in respect [to] the eviction.”

In the meantime, the agencies’ advisory is designed to protect US telecommunication networks from both Salt Typhoon and all kinds of hackers, he said.

SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.”,”first_published_at”:”2021-09-30T21:22:09.000000Z”,”published_at”:”2022-03-24T14:57:33.000000Z”,”last_published_at”:”2022-03-24T14:57:28.000000Z”,”created_at”:null,”updated_at”:”2022-03-24T14:57:33.000000Z”})” x-show=”showEmailSignUp()” x-intersect.once=’window.trackGAImpressionEvents(“pcmag-on-site-newsletter-block”, “SecurityWatch”, $el)’ readability=”32.335062240664″>

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Newsletter Pointer

About Michael Kan

Senior Reporter

Michael Kan

I’ve been working as a journalist for over 15 years—I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017.


Read Michael’s full bio

Read the latest from Michael Kan

Facebook Comments Box

Popular Articles

Close