News

Feds Advocate for End-to-End Encryption After Major Telecom Breach Linked to Suspected Chinese Hackers – One America News Network


BERLIN, GERMANY - DECEMBER 27: A participant examines a circuit board alongside an oscilloscope during the first day of the 28th Chaos Communication Congress (28C3) - Behind Enemy Lines computer hacker conference on December 27, 2011 in Berlin, Germany. The Chaos Computer Club, Europe's largest network of computer hackers, attracts around 3,000 attendees annually. (Photo by Adam Berry/Getty Images)
A participant examines a circuit board alongside an oscilloscope on the first day of the 28th Chaos Communication Congress (28C3) – Behind Enemy Lines computer hacker conference on December 27, 2011 in Berlin, Germany. (Photo by Adam Berry/Getty Images)

OAN Staff Blake Wolf
5:55 PM – Thursday, December 19, 2024

In light of a significant telecom breach, users of Apple and Android devices are being advised to avoid receiving two-factor authentication codes via text messages, as those could expose unencrypted communications to suspected Chinese hackers.

Advertisement

The Cybersecurity and Infrastructure Security Agency (CISA) issued a memo on Wednesday addressing the issue, advising individuals against using SMS for two-factor authentication on online accounts.

“SMS messages are not encrypted — a threat actor with access to a telecommunication provider’s network who intercepts these messages can read them,” CISA cautioned.

This month, the FBI recommended that smartphone users switch to encrypted messaging applications like Signal or WhatsApp after suspected Chinese hackers infiltrated AT&T, T-Mobile, Verizon, and several other networks to monitor certain service users.

Messaging applications such as WhatsApp, Apple’s iMessage, and Signal provide enhanced security through end-to-end encryption, which means that the content of messages cannot be seen by potential attackers or the companies themselves.

“SMS messages are not encrypted — a threat actor with access to a telecommunication provider’s network who intercepts these messages can read them,” CISA reiterated.

The hacker group known as “Salt Typhoon,” which U.S. officials attribute to the Chinese Government, is reportedly engaged in efforts that are “ongoing and likely larger in scale than previously understood,” according to experts.

Jeff Greene, the executive assistant director for cybersecurity at CISA, remarked that the compromise attributed to Salt Typhoon is “part of a broader pattern of PRC activity aimed at critical infrastructure.”

“We cannot say with certainty that the adversary has been evicted,” Greene added. “This is an ongoing PRC endeavor that requires long-term preparation and defense.”

“We’re actively working to track them down … but we cannot assert with confidence that we have a complete understanding, nor would our partners,” he further noted.

While some online services may not have alternative options available, the agency recommends that users utilize different two-factor authentication methods wherever possible to mitigate hacking risks. They also suggest employing a password manager, creating strong passwords, enabling a PIN when feasible, and keeping personal devices updated.

Stay informed! Get breaking news alerts directly to your inbox for free. Subscribe here. https://www.oann.com/alerts

Advertisements below

Share this post!





Source link

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.