Loading...
Loading...
Browse all stories on DeepNewz
VisitWhat will be identified as the primary method used by Salt Typhoon hackers by December 31, 2025?
Phishing • 25%
Exploiting software vulnerabilities • 25%
Insider threats • 25%
Other • 25%
Reports from cybersecurity firms or government agencies
AT&T and Verizon Clear Networks After China-Linked Salt Typhoon Hack Affects 9 Telcos
Dec 28, 2024, 11:19 PM
AT&T Inc. has confirmed that it was targeted by the China-linked Salt Typhoon hacking operation, but stated that its networks are now free from the intrusion. The hackers aimed to obtain foreign intelligence information, according to the company. AT&T is cooperating with authorities and notifying affected parties. Verizon Communications Inc. was also affected by the intrusion. The White House reported that the breach, which affected nine telecommunications companies in total, was largely due to telecoms failing to implement basic cybersecurity measures. The intrusion involved accessing systems used by the federal government for court-authorized wiretap requests. Named by Microsoft Corp. as Salt Typhoon, the hackers' actions prompted the White House to issue a threat-hunting and hardening guide to telecoms. The U.S. government is still assessing the full impact of the hack, with officials noting that less than 100 individuals were directly affected, though a large number of people in the Washington, D.C. area were targeted for geolocation data. China has repeatedly denied involvement in the hacking operation.
View original story
Other • 25%
Phishing attacks • 25%
Insider threats • 25%
Exploiting software vulnerabilities • 25%
Software vulnerabilities • 25%
Phishing • 25%
Other • 25%
Insider threats • 25%
Exploiting software vulnerabilities • 25%
Other methods • 25%
Insider threats • 25%
Phishing attacks • 25%
Phishing attacks • 25%
Zero-day vulnerabilities • 25%
Insider threats • 25%
Supply chain attacks • 25%
No • 50%
Yes • 50%
U.S. Telecommunications • 25%
U.S. Power Grid • 25%
U.S. Ports • 25%
Other Critical Infrastructure • 25%
Personal data • 25%
Other • 25%
Government communications • 25%
Corporate data • 25%
No • 50%
Yes • 50%
Increased cybersecurity measures • 25%
Diplomatic measures • 25%
Sanctions • 25%
Cyber retaliation • 25%
No • 50%
Yes • 50%
CISA • 25%
FBI • 25%
NSA • 25%
Other • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
No • 50%
Yes • 50%
501 to 1000 • 25%
Less than 100 • 25%
More than 1000 • 25%
100 to 500 • 25%