China-Backed Salt Typhoon Hacking Group Remains Embedded in US Telecommunications
Chinese state-backed hacking group Salt Typhoon is engaged in an ongoing attack on vast swaths of the U.S. telecommunications infrastructure.
Policymakers are scrambling to find a solution to stop a massive, ongoing hack of U.S. telecommunications networks by a Chinese state-backed cyber group known as Salt Typhoon.
Salt Typhoon has engaged in a wide-ranging espionage campaign since 2022, infiltrating major U.S. telecommunications networks over the years.
Major corporations such as Verizon, AT&T, and CenturyLink are among the companies targeted. The hackers have used persistent access to those companies’ infrastructure to collect metadata from a large number of customers, including the dates, times, and recipients of calls and texts made by an unknown number of Americans.
Though the total scale of metadata stolen is not yet known, the hackers also absconded with the actual audio files of calls and content from texts from a smaller group of users, including some at the highest echelons of government.
Vance added that he did not believe the hackers were able to exfiltrate his calls and texts because he was using a third-party app for encryption purposes.
Though the FBI has contacted individuals whose calls and texts were explicitly targeted by the campaign, the officials have left the responsibility of notifying those whose metadata was compromised to the discretion of the telecommunications companies.
The apparent scope and severity of the Salt Typhoon attack raise questions about the security of the telecommunications infrastructure used by most Americans every day and the policies used by government agencies to collect data on American citizens.
Vance said that Salt Typhoon was able to tap into his phone because the group exploited backdoors in the companies’ infrastructure originally established to accommodate the Foreign Intelligence Surveillance Act (FISA) and the Patriot Act, which granted U.S. intelligence agencies sweeping surveillance powers.
Greene also underscored that the China-backed hackers are still in U.S. infrastructure and that it is unclear when they will be fully evicted.
“I think it will go down as maybe one of the most significant cyberattacks we’ve faced in our country,” Warner said.
Yet Salt Typhoon is only one part of a suite of Chinese state-backed hacking groups to emerge in the past half-decade, each of which has aimed to undermine U.S. national security in some way.
“These actors put a premium on preparing offensive capability during peacetime, in part by preemptively planting footholds in our infrastructure, ” Director of National Intelligence Avril Haines said during a congressional hearing on the matter earlier in the year.
The infected devices were then used to create a massive network of infected computers, or botnet, that could be used to carry out other cyber crimes, the FBI said.
It is unclear at this time what, if any, action the Biden administration will take in response to the sweeping cyberattacks.
Responding to a question from The Epoch Times, State Department spokesperson Matthew Miller said that he would not preview any actions the administration may or may not take against China.
China’s ruling Communist Party denies that it engages in espionage against Americans.