Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: China’s Telecom Hack ‘Most Serious’ in US History
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: China’s Telecom Hack ‘Most Serious’ in US History
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
GeopoliticsNewsChinaCyber Espionage

China’s Telecom Hack ‘Most Serious’ in US History

Alexis Hess
November 29, 2024 at 11:35 AM
By Alexis Hess Alexis Hess
Share
chinese salt typhoon hack against the united states
SHARE

chinese salt typhoon hack against the united states

US Senator Mark Warner has called the Salt Typhoon hack, conducted by a group that has been linked to Chinese intelligence, “the most serious telecoms hack in our history.” In a recent interview with the NY Times, Warner also said that hackers were able to listen in on telephone calls and access text messages, emphasizing that “every major provider has been broken into.”

This follows hard on the FBI releasing a joint statement with the US Cybersecurity and Infrastructure Security Agency (CISA), in which they announced that “China-affiliated actors have compromised networks at multiple telecommunications companies.”

Salt Typhoon is a Chinese government-backed threat group known to be engaged in cyberespionage campaigns against the US government and US telecommunication firms. The name “Typhoon” was originally coined by Microsoft and is assigned to several threat groups sponsored by the People’s Republic of China (PRC). In a recent “In Focus” document, the US Intelligence Community states that “the PRC is the most active and persistent cyber threat to US institutions.”

US officials have discovered that the hackers were able to compromise telecommunication systems by taking advantage of security gaps in outdated equipment. The hackers specifically targeted individuals involved in government activity and were able to listen in on conversations between “a number of well-connected Americans,” including President-elect Donald Trump and Vice President-elect JD Vance. Hackers were able to access messages and calls administered through regular networks but were unable to obtain encrypted messages, such as those from WhatsApp and Signal.

Senator Warner said that he was “stunned by the scope and depth of the breach,” adding that investigations are still ongoing. Warner is also convinced that this hack was not contained to Washington, emphasizing that it is “crucial” for the public to understand that this was far broader than government officials’ current knowledge.

“We have to let the American people know this,” states Warner. “Folks need to know.”

Florida Telecommunications worker accused of being a Chinese Spy

This intrusion, although the most serious, is far from being the first of its kind.

In other news, former telecommunications worker Ping Li was recently sentenced to four years of prison for conspiring to act as an agent for the PRC. Li reportedly spied on his employers in order to pass along information to the PRC’s Ministry of State Security (MSS). Li was also ordered to pay a $250,000 fine.

According to court documents, the MSS would often use “cooperative contacts” outside the PRC in order to obtain information seen as beneficial to their intelligence goals. From 2012 to 2022, Li allegedly sent a variety of information to the MSS, including hacking events targeting US companies, information on Chinese dissidents, and information regarding Li’s previous workplaces.

TAGGED: geopolitics, salt typhoon, state-sponsored hack, cyber war, the new York times, federal bureau of investigations, united states intelligence, chinese hackers, intel operations, united states, people's republic of china, Cybersecurity, national security, communist agenda, china, cyber warfare, florida telecommunications, cyber espionage, us cybersecurity and infrastructure agency, corporate intrusion, whatsapp, ping li, signal, chinese dissidents
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article seasonal cybercrime on the rise Seasonal cybercrime bonanza is under way
Next Article korean cyber bust, the tip of southeast asian cybercrime iceberg $1bn Korean bust is tip of SE Asian cybercrime iceberg
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
NewsCybergangs

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
NewsCyber EspionageGovernmentGeopolitics

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
SpywareNewsChinaCyber EspionageSurveillance

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?