Which agency will lead the next major telecom security initiative in 2025?
FBI • 25%
CISA • 25%
Department of Homeland Security • 25%
National Security Agency • 25%
Official announcements or initiatives launched by U.S. government agencies
T-Mobile Confirms Breach by Chinese Hackers, Still Embedded in U.S. Telecom Networks
Dec 3, 2024, 06:30 PM
T-Mobile, the second-largest wireless carrier in the U.S., has confirmed a cyberattack by the China-linked hacking group Salt Typhoon. The U.S. government, through the FBI and the Cybersecurity and Infrastructure Security Agency (CISA), has acknowledged that Chinese hackers remain embedded in U.S. telecom networks following a significant cyber espionage campaign. This campaign has enabled the hackers to access records and listen to voice calls. Despite efforts by the government, telecom companies are still struggling to evict these hackers from their networks. The FBI and CISA have issued guidance to mitigate such attacks, emphasizing basic cybersecurity practices like monitoring assets, managing device configurations, limiting access, segmenting networks, and encrypting traffic.
View original story
Other • 25%
AT&T • 25%
T-Mobile • 25%
Verizon • 25%
Encrypted Messaging • 25%
Increased Cybersecurity Workforce • 25%
Advanced Threat Detection Systems • 25%
Network Segmentation • 25%
Verizon • 25%
AT&T • 25%
Other company • 25%
T-Mobile • 25%
AI-based threat detection • 25%
Advanced firewall systems • 25%
Other • 25%
End-to-end encryption • 25%
Department of Homeland Security • 25%
Cybersecurity and Infrastructure Security Agency • 25%
National Security Agency • 25%
Federal Bureau of Investigation • 25%
Partial compliance • 25%
Legal challenge • 25%
Non-compliance • 25%
Full compliance • 25%
Seek amendments • 25%
Support the proposal • 25%
Oppose the proposal • 25%
No official stance • 25%
Verizon • 25%
T-Mobile • 25%
Other • 25%
AT&T • 25%
Independent cybercriminal groups • 25%
Other • 25%
Chinese government hackers • 25%
Russian government hackers • 25%
Partial compliance • 25%
Non-compliance • 25%
Legal challenge • 25%
Full compliance • 25%
No • 50%
Yes • 50%
Access control improvements • 25%
Regular security audits • 25%
Network segmentation • 25%
Enhanced encryption • 25%