US Telecom Breaches Expand as Nine Companies Targeted by Chinese Salt Typhoon Hackers

The Wall Street Journal has reported that Charter Communications, Consolidated Communications, and Windstream have joined the expanding list of U.S. telecommunications companies targeted by Chinese state-sponsored hackers as part of the Salt Typhoon cyber campaign. This development underscores the continued vulnerability of critical infrastructure in the face of foreign espionage efforts.

These revelations follow previously confirmed breaches involving major players such as AT&T, Verizon, T-Mobile, and Lumen Technologies, as highlighted in prior reporting by Hackread.com. According to Anne Neuberger, the White House Deputy National Security Adviser for Cyber and Emerging Technologies, the Salt Typhoon campaign has compromised nine U.S. telecoms, with the identities of the latest three still unspecified.

According to the Wall Street Journal’s investigative findings, these intrusions were facilitated by exploiting vulnerabilities identified in network devices manufactured by Fortinet and Cisco. The attackers were able to gain unauthorized access, often through control of high-level network management accounts that lacked multi-factor authentication. Once inside, they could monitor network traffic and potentially conceal their tracks by accessing multiple routers.

This series of breaches has catalyzed a wave of government initiatives aimed at bolstering the security of American telecom infrastructures. Recently, the U.S. Department of Treasury took action by sanctioning a Chinese cybersecurity firm implicated in another cyber incident. Concurrently, steps are being taken across various governmental agencies to reinforce security measures within the telecommunications sector, including increased scrutiny by the FCC and proposed legislation for enhanced security protocols.

Organizations are advised to ramp up their cybersecurity practices in light of these persistent threats. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has even recommended that government personnel transition to end-to-end encrypted messaging platforms, such as Signal, to safeguard communications.

The ongoing targeting of U.S. telecommunications highlights the broader implications of the Salt Typhoon campaign, indicating a possible shift from conventional espionage tactics to more disruptive approaches. Experts are increasingly recommending that organizations engaged in international business or overseeing critical infrastructure take proactive measures to fortify their cybersecurity defenses.

Chris Hauk, a Consumer Privacy Champion at Pixel Privacy, emphasized the urgency for potential targets of these Chinese actors to implement security protocols as outlined by agencies such as the FBI and NSA. He noted that organizations across the board should prioritize measures such as timely patching and upgrades, restricting access to sensitive accounts, and employing robust encryption techniques to mitigate risks.

The latest findings reflect a significant escalation in the threat landscape, emphasizing the importance of adhering to cybersecurity best practices. Business owners must remain vigilant and proactive to defend against these sophisticated attacks, which exploit known vulnerabilities and target essential services across the telecommunications sector.

Source