What method did Salt Typhoon primarily use for telecom infiltration by December 31, 2025?
Phishing attacks • 25%
Zero-day vulnerabilities • 25%
Insider threats • 25%
Supply chain attacks • 25%
Cybersecurity reports or official investigations
FBI Warns: Chinese 'Salt Typhoon' Hackers Infiltrate AT&T, Verizon Over Two Years
Dec 4, 2024, 11:51 AM
U.S. officials have disclosed that Chinese government hackers have infiltrated at least eight American telecommunications companies, including AT&T and Verizon, over the past two years as part of a broad and ongoing cyber espionage campaign. The hacker group, known as Salt Typhoon, has compromised telecom networks, allowing them to access sensitive data including call records and potentially intercept voice calls. High-profile government officials were among those targeted, with data on more than 1 million customers potentially stolen. Despite efforts by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) to assist telecom firms, the hackers remain embedded within their networks, and officials have not provided a timeline for their removal. The campaign has also impacted dozens of other countries worldwide. In response, U.S. authorities are urging individuals to use encrypted messaging apps such as iMessage and FaceTime to protect their communications from foreign hackers.
View original story
Exactly 8 • 25%
More than 8 • 25%
Less than 8 • 25%
Unable to confirm • 25%
Corporate data • 25%
Personal data • 25%
Government communications • 25%
Other • 25%
Insider threats • 25%
Exploiting software vulnerabilities • 25%
Phishing attacks • 25%
Other • 25%
Insider threats • 25%
Phishing • 25%
Exploiting software vulnerabilities • 25%
Other • 25%
Former President Donald Trump • 25%
Current Director of National Intelligence • 25%
Other • 25%
Current Secretary of State • 25%
Verizon • 13%
Other telecom company • 13%
No major breach reported • 13%
AT&T • 13%
Other methods • 25%
Insider threats • 25%
Exploiting software vulnerabilities • 25%
Phishing attacks • 25%
Other • 25%
Phishing • 25%
Insider threats • 25%
Software vulnerabilities • 25%
Australia • 25%
United Kingdom • 25%
Japan • 25%
Germany • 25%