News

Federal Authorities Advocate for End-to-End Encryption After Major Telecom Breach Linked to Suspected Chinese Hackers – One America News Network


BERLIN, GERMANY - DECEMBER 27: A particpant examines a circuit board alongside an oscilloscope on the opening day of the 28th Chaos Communication Congress (28C3) - Behind Enemy Lines computer hacker conference on December 27, 2011 in Berlin, Germany. The Chaos Computer Club, Europe's largest network of computer hackers, attracts up to 3,000 attendees annually. (Photo by Adam Berry/Getty Images)
A participant examines a circuit board alongside an oscilloscope on the opening day of the 28th Chaos Communication Congress (28C3) – Behind Enemy Lines computer hacker conference held on December 27, 2011 in Berlin, Germany. (Photo by Adam Berry/Getty Images)

OAN Staff Blake Wolf
5:55 PM – Thursday, December 19, 2024

In light of a substantial telecom breach, users of Apple and Android devices are being advised to avoid receiving two-factor authentication codes via SMS to protect against the potential exposure of unencrypted messages by suspected Chinese hackers.

Advertisement

The Cybersecurity and Infrastructure Security Agency (CISA) issued a memorandum on Wednesday addressing this threat, advising individuals not to rely on SMS for the second factor of authentication for their online accounts.

“SMS messages are not encrypted — a threat actor with access to a telecommunication provider’s network can intercept and read these messages,” warned CISA.

Earlier this month, the FBI encouraged mobile users to adopt encrypted messaging applications such as Signal or WhatsApp after suspected Chinese hackers infiltrated AT&T, T-Mobile, Verizon, and five other networks to monitor specific service users.

Messaging applications like WhatsApp, Apple’s iMessage, and Signal provide enhanced security through end-to-end encryption, which ensures that messages are not accessible to potential hackers or even the companies hosting the services.

“SMS messages are not encrypted — a threat actor with access to a telecommunication provider’s network can intercept and read these messages,” cautioned CISA once more.

The actions of the hacker group known as “Salt Typhoon,” which U.S. officials believe operates under the auspices of the Chinese government, are reportedly “ongoing and likely more widespread than previously thought,” according to experts.

Jeff Greene, executive assistant director for cybersecurity at CISA, remarked that the Salt Typhoon breach “is indicative of a larger pattern of activities directed at critical infrastructure by the PRC.”

“We cannot confirm that the adversaries have been expelled,” Greene added. “This ongoing PRC activity requires us to remain vigilant and prepared for long-term defensive measures.”

“We are actively pursuing these threats … but we cannot confidently assert that we possess complete visibility, nor can our partners,” he concluded.

Although some online services may not support alternatives, the agency encouraged consumers to utilize additional two-factor authentication methods to mitigate the risk of hacking. They also recommended employing a password manager, creating strong passwords, setting up a PIN when possible, and regularly updating personal devices.

Stay informed! Get breaking news alerts directly to your inbox for free. Subscribe here: https://www.oann.com/alerts

Advertisements below

Share this post!





Source link

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.