Salt Typhoon Hacking Campaign Exposes Massive Security Breaches in U.S. Telecoms 

0
176

A Chinese-backed cyber espionage group known as Salt Typhoon has been linked to one of the largest hacking campaigns targeting U.S. telecommunications and internet providers, with the FBI confirming that at least 200 American companies have been breached.

The revelation underscores mounting concerns over the security of legally mandated surveillance backdoors built into telecom infrastructure.

AI Boom or AI Bubble? Investors Weigh Risks Amid Soaring AI Investments – USA Herald

Signup for the USA Herald exclusive Newsletter

Salt Typhoon Scale of the Attack

According to FBI Assistant Director Brett Leatherman, Salt Typhoon’s campaign extends far beyond U.S. borders. “This activity is ongoing,” Leatherman told The Washington Post, revealing that the hackers infiltrated networks in 80 countries, exposing the global scope of the campaign.

The attackers previously compromised AT&T, Verizon, and Lumen, while later disclosures confirmed that Charter Communications and Windstream were also targeted. The group infiltrated wiretap systems, which under U.S. law are designed to allow government surveillance of criminal or national security threats. These systems, however, proved to be one of the most vulnerable gateways.

The Risks of Surveillance Backdoors

For years, technologists have warned that legally required surveillance backdoors in telecommunications infrastructure could serve as a ticking time bomb. The Salt Typhoon hacks validate those fears. By gaining access to call records of senior American politicians and officials, the hackers could map out sensitive communications—including who U.S. agencies were monitoring.