Loading...
Loading...
Browse all stories on DeepNewz
VisitWhich telecom company will be most affected by Salt Typhoon in terms of data compromised by March 31, 2025?
AT&T • 25%
Verizon • 25%
T-Mobile • 25%
Other • 25%
Official statements or credible news reports
White House Confirms Salt Typhoon Cyberespionage Targeting 9 Telecoms, Affecting Millions of Americans' Geolocation and Phone Calls
Dec 29, 2024, 12:37 AM
The White House has confirmed a major cyberespionage incident known as 'Salt Typhoon,' attributed to Chinese hackers, which has affected multiple U.S. telecom companies. The incident has resulted in the geolocation of millions of Americans and the recording of their phone calls. The victim count has increased to nine telecom companies, with AT&T and Verizon among those targeted. The White House has criticized the telecom sector for failing to implement basic cybersecurity measures, which contributed to the breach. In response, the administration has issued a threat-hunting and hardening guide to help telecoms secure their networks. AT&T has acknowledged the attack but stated that its networks are now clear of intrusion, noting that the hackers targeted a few individuals of foreign intelligence interest. The breach has raised concerns about national security and the potential manipulation of surveillance data by Chinese intelligence.
View original story
Charter Communications • 25%
Consolidated Communications • 25%
Other • 25%
Windstream • 25%
Verizon • 25%
AT&T • 25%
Other • 25%
T-Mobile • 25%
T-Mobile • 25%
AT&T • 25%
Verizon • 25%
Other • 25%
AT&T • 25%
Other affected telecom • 25%
None • 25%
Verizon • 25%
No • 50%
Yes • 50%
9 • 25%
10 • 25%
11 • 25%
12 or more • 25%
Comcast • 25%
Other • 25%
T-Mobile • 25%
Sprint • 25%
AT&T • 13%
No major breach reported • 13%
Other telecom company • 13%
Verizon • 13%
T-Mobile • 25%
Verizon • 25%
Other • 25%
AT&T • 25%
More than Eleven • 25%
Ten • 25%
Nine • 25%
Eleven • 25%
No • 50%
Yes • 50%
No • 50%
Yes • 50%
Yes • 50%
No • 50%
Insider threats • 25%
Other • 25%
Phishing attacks • 25%
Exploiting software vulnerabilities • 25%