The White House revealed that a ninth U.S. telecom firm has been hacked as part of the Chinese espionage campaign known as Salt Typhoon. This extensive hacking operation has allowed Beijing to access private texts and calls of an unknown number of Americans, including senior government officials and political figures.
Deputy National Security Adviser Anne Neuberger announced the update on Friday, following earlier reports confirming eight telecom companies were targeted. The campaign has also affected dozens of other nations, exposing significant cybersecurity gaps.
Espionage Goals and Tactics
Salt Typhoon’s primary objective appears to be spying on individuals involved in government or political activities.
“Hackers aimed to identify phone owners and monitor texts and calls of government targets,” Neuberger explained.
The attacks have predominantly impacted individuals in the Washington-Virginia area. FBI officials suspect senior government officials were among those targeted.
The Chinese hackers used advanced techniques to compromise telecommunications networks and obtain call records while maintaining a low profile. This careful approach has hindered efforts to determine the full scope of affected Americans.
Need for Cybersecurity Reforms
Neuberger emphasized the inadequacy of voluntary cybersecurity measures in safeguarding critical infrastructure from hacking attempts by countries like China, Russia, and Iran.
“Stronger cybersecurity practices are essential to counter such threats,” she stated.
The Federal Communications Commission (FCC) is set to discuss mandatory cybersecurity protocols for the telecom industry in an upcoming meeting. Additionally, the government is preparing new actions to respond to the hacking campaign, though specific measures were not disclosed.
China’s Denial and the Path Forward
The Chinese government has denied any involvement in the Salt Typhoon campaign. Despite this, the episode has highlighted the urgent need for robust cybersecurity frameworks to protect U.S. telecommunications networks and critical infrastructure.