US government is in alert state after cyberattacks attributed to China and which violated large parts of the US telecommunications network. The incident described as “the worst attack on a telecommunications network in US history”, stressing that compared to it, previous Russian attacks look like a “game”.
This complex cyberattack – China’s most ambitious – is attributed to the hacker group Salt Typhoon and, according to authorities, her action started Already in 2022. Its aim was to ensure permanent access to US telecommunications networks, exploiting weaknesses in companies-got networks such as AT&T, Verizon and Lumen.
As emerged from a one -year study, the many years of Salt Typhoon attack proved to be much more extensive: Allegedly hit over 80 countries, and may have stole data of almost every American citizen. For Washington officials, this is an indisputable proof that Chinese potential in the digital are threateningly – if not competing – those of the US and their allies.
Researchers, citing an unprecedented joint statement of several Western countries, warn that the information stolen from cyberattacks could allow China’s secret services to monitor politicians, spies and activists, according to the New York Times.
It is a rare and indicative movement that reveals the magnitude of concern. Hackers are even alleged They also targeted the communications of Donald Trump and the candidate for Vice President Jay Di Vance during the 2024 election campaign.
A global phenomenon
According to researchers, the cyberattack of Salt Typhoon was not an isolated energy, but a long, coordinated campaign. He penetrated telecommunications giants and other critical infrastructure, in order to create “back doors” in systems used not only by citizens but also by the US secret services themselves.
The leak of such information is considered extremely dangerous, as it may have helped China discover who its own spies were targeted.
The team was not limited to the US. Trend Micro surveys revealed that Salt Typhoon had violated critical infrastructure and in other countriessomething confirmed by the US authorities. The breadth of the attack is such that, according to the same sources, it gives Beijing the opportunity to take advantage of global communications networks to monitor politicians, agents and activists.
Despite these steps, the authorities admit that they have not yet fully removed hackers from violated networks, while the exact range and seriousness of the attack remain unclear.
Protection measures from “Digital Hurricane”
US officials argue that many of the methods by which Salt Typhoon has managed to penetrate his goals were based on existing infrastructure weaknesses for this is more critical than ever to exist Strong security programs They will prevent such attacks, especially in critical infrastructure, such as telecommunications networks.
In addition, companies and governments should ensure that the IT departments and cyber security programs are sufficiently staffed and funded to meet the needs and apply optimal practices.
However, experts point out that the average American citizen probably doesn’t have much to fear from Salt Typhoon. It is unlikely that Beijing is interested in family phone calls or messages to friends. However, for those who want to somewhat enhance their safety and privacy, using applications with End-to-end encryption, Like Signal, Facetime or Imessage, it is considered a good practice.
Equally important is to avoid the use of default or easy codes on devices. At the same time, two -factor authentication can provide an additional level of protection.