Loading...
Loading...
Browse all stories on DeepNewz
VisitWill a closed-door briefing on Salt Typhoon hacks occur by November 2024?
Yes • 50%
No • 50%
Official announcements or reports from the House Select Committee
U.S. Probes China's 'Salt Typhoon' Hacks on Wiretap Systems; Lawmakers Seek Closed-Door Briefing
Oct 12, 2024, 01:53 PM
U.S. officials are investigating the severity of cyberattacks linked to China targeting U.S. broadband providers. The hacking group, known as "Salt Typhoon," has maintained access to some breached networks as recently as last week, according to sources cited by the Wall Street Journal. More potential victims have been notified of possible compromise. The Biden administration has assembled a multi-agency team to address the growing crisis involving Chinese cyberattacks on U.S. telecommunications companies, believed to be for intelligence gathering purposes. NSA Cybersecurity Director Dave Luber noted that China has been known to exploit security vulnerabilities to access systems globally, particularly in the U.S. He stated that "we face a cyber-adversary the likes of which we have never confronted before." The House Select Committee on the Chinese Communist Party is probing the Salt Typhoon group, suspected of breaching systems used for court-approved wiretapping. Representatives John Moolenaar and Raja Krishnamoorthi sent a joint letter to company executives on Thursday, demanding information on the hack and recommendations for the federal government. The committee is requesting a closed-door briefing from appropriate company representatives regarding the reported Salt Typhoon breach.
View original story
Increased funding for cybersecurity • 25%
New regulations for telecom carriers • 25%
No significant policy changes • 25%
Other outcomes • 25%
Yes • 50%
No • 50%
Increased cybersecurity measures announced • 25%
No new measures announced • 25%
Sanctions against China proposed • 25%
Other outcomes • 25%
Confirmed Chinese government involvement • 25%
Inconclusive evidence • 25%
Attributed to independent group • 25%
No public conclusion • 25%
Yes • 50%
No • 50%
FBI • 25%
NSA • 25%
Department of Homeland Security • 25%
Other • 25%
Yes • 50%
No • 50%
Espionage • 25%
Economic sabotage • 25%
Political influence • 25%
Other • 25%
FBI • 25%
NSA • 25%
Department of Homeland Security • 25%
Other • 25%
Increased cybersecurity funding • 25%
Stricter telecom regulations • 25%
International diplomatic action • 25%
Other • 25%
Yes • 50%
No • 50%
11 to 20 • 25%
Less than 5 • 25%
More than 20 • 25%
5 to 10 • 25%
Other findings • 25%
Focus on U.S. cybersecurity failures • 25%
Attribution to Chinese state actors • 25%
Inconclusive results • 25%