Chinese hackers target U.S. telecoms: What you need to know to protect your data

Major American telecommunications companies are constantly under attack by Chinese hackers. A federal investigation has revealed a massive Chinese government cyber espionage campaign targeting U.S. telecommunications networks to steal Americans’ information. Senior White House officials confirmed that at least eight U.S. telecommunications companies were affected by the hack.
To address this issue, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) issued recommendations to telecom companies to help them detect and stop hackers while preventing future attacks. I break down the details of this Chinese hacking campaign and share tips on how to keep your data safe.
GET SECURITY ALERTS, EXPERT TIPS – SUBSCRIBE TO KURT’S NEWSLETTER – CYBERGUY REPORTS HERE
Illustration of hacker at work (Kurt “CyberGuy” Knutson)
What you need to know about Chinese hacking
According to the FBIBeijing-linked hackers penetrated the networks of “multiple” telecommunications companies and gained access to customer call records and private communications of “a limited number of individuals.” Since this is an espionage operation, they are not interested in the average Joe’s text messages or call logs. Instead, they target Americans involved in government and politics.
The hackers also attempted to copy “certain information requested by U.S. law enforcement pursuant to a court order,” according to the FBI. That suggests they may have been trying to violate programs like the Foreign Intelligence Surveillance Act, which allows U.S. spy agencies to monitor the communications of individuals suspected of working for foreign powers.
Earlier this month, Deputy National Security Adviser Anne Newberg shared new details about the scale of Chinese hacking activity. Neuberger said the United States believes the hackers successfully obtained the communications information of senior government officials and prominent political figures.
She explained that while the hackers targeted a relatively small group of people, a limited number of Americans had their phone calls and text messages compromised. Newberg also mentioned that the affected telecom companies are working hard to resolve these vulnerabilities, but none have yet been able to completely remove the Chinese hackers from their networks.
The activity is believed to have started a year or two ago, according to the agency. Associated Press. Authorities suspect a Chinese hacker group called “Salt Typhoon” was behind the operation.

Illustration of hacker at work (Kurt “CyberGuy” Knutson)
Here are the messages ruthless hackers stole from 110 million AT&T customers
How do hackers obtain sensitive information?
Experts believe Salt Typhoon managed to access call logs and private communications by exploiting decades-old backdoors from major telecommunications providers such as AT&T and Verizon.
“The irony is that the backdoors the Chinese are exploiting are actually the same backdoors used by federal law enforcement for legal surveillance,” John Ackerly, CEO and co-founder of Virtru, a security-focused company, told Cyber Guy.
The vulnerabilities are the result of the Communications Assistance for Law Enforcement Act (CALEA), a federal law that requires backdoors in critical telecommunications infrastructure. CALEA enables law enforcement agencies to access phone records and metadata as part of authorized investigations, including by facilitating wiretaps.
“The problem with backdoors is simple. They are not selective. Essentially, a backdoor created for law enforcement is a vulnerability in the system. Once the vulnerability exists, it can be exploited by anyone who finds them. Good guys and bad guys can get into the backdoor. said Ackerley, a former White House technology adviser.

Illustration of hacker at work (Kurt “CyberGuy” Knutson)
Beware of encrypted PDFs as the latest trick to deliver malware to you
The solution is end-to-end encryption
To protect private conversations and phone calls, cybersecurity experts recommend using an end-to-end encrypted platform. Jeff Greene, CISA’s executive assistant director for cybersecurity, urged Americans to prioritize encrypted communications tools.
“Use it where there is encrypted communication,” Green advised, stressing the importance of a secure platform. He added, “We absolutely need to do this to see what its long-term implications are and how we protect our networks.”
An FBI official warned that citizens should “use phones that automatically receive timely operating system updates, responsibly managed encryption, and anti-phishing MFA for email, social media and collaboration tool accounts.”
However, cybersecurity experts warn that these measures are not foolproof. The term “responsibly managed encryption” is problematic because it deliberately leaves room for “lawful access”, such as the backdoors required by CALEA.
“It’s clear that encryption with backdoors is actually irresponsible at all,” Ackerley said. “It is time for the U.S. government to recognize and support end-to-end encryption as a stronger protection against foreign adversaries.”

Illustration of cyber security expert at work (Kurt “CyberGuy” Knutson)
What to do if your bank account is hacked
10 ways to protect your personal information from online security threats
Now that we’ve discussed the threats, let’s look at the solutions. Here are 10 ways you can protect your personal information.
1) Use an end-to-end encryption platform: For private communications, prioritize platforms that offer end-to-end encryption. This ensures that only you and the intended recipients have access to your message or call, preventing unauthorized access by hackers or other third parties.
“Anyone can take control of their data and protect themselves from security threats by using apps that offer end-to-end encryption. Whether you’re emailing, sending messages and files, or video chatting, truly keeping your data safe The only way to avoid bad actors is to encrypt it in transit,” Ackerley said. “Choose an app or tool that’s easy to use so you actually use it.”
For sending text messages, consider apps like Signal or WhatsApp. For email services, look for one that offers easy-to-use end-to-end encryption. These platforms keep your private communications safe from unauthorized access. Check out my review of the best secure and private email services here.
2) Keep the installation operating system updated: Make sure your phone and other devices automatically receive timely operating system updates. These updates often include important security patches that prevent hackers from exploiting new vulnerabilities. For reference, see my guide How to keep all your devices updated.
3) Enable two-factor authentication (2FA): Set up anti-phishing 2FA On your email, social media, and collaboration accounts. This adds an extra layer of protection by requiring only a password to access your account, making it harder for cybercriminals to steal your information.
4) Use powerful anti-virus software: Please be aware of phishing techniques and be suspicious of suspicious links, emails, or phone calls soliciting personal information. Cybercriminals often use these methods to access your sensitive data.
The best way to protect yourself from malicious links is to install anti-virus software on all your devices. This protection also alerts you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the 2024 winners of the best antivirus protection for your Windows, Mac, Android, and iOS devices.
5) Encrypt sensitive information: Encrypt data Data protection on USB drives, SIM cards and laptops to protect information if the device is lost or stolen. Also, be sure to password-protect your sensitive files or folders by following these steps these steps.
6) Implement strong password practices: Use unique, complex passwords for each account and consider using Password manager.
7) Back up your data regularly: Backing up your data helps prevent data loss due to ransomware or device failure. You need to back up your mobile device, apple and Windows computer.
8) Use public Wi-Fi with caution: use a VPN (Virtual Private Network) When connected to Public wireless network network to encrypt your internet traffic. This makes it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN helps hide your location and online activities by masking your IP address. While VPNs cannot directly block phishing emails, they can reduce the risk of exposing your browsing habits to trackers that may use this information maliciously. With a VPN, you can securely access your email account from anywhere, even in areas with restricted internet policies. For the best VPN software, see my expert reviews of the best VPNs for private browsing on your computer. Windows, Mac, Android and iOS devices.
9) Invest in personal data deletion service: Consider services that remove your personal information from public databases. This reduces the chance of data being exploited in phishing or other cyberattacks after a breach. Check out my preferred data removal services here.
10) Use identity theft protection: Identity theft protection services can monitor your accounts for unusual activity, alert you to potential threats, and even help resolve the issue if your data is compromised. See my tips and best options on how to protect yourself from identity theft.
Kurt’s key takeaways
There is no denying that the United States is facing serious cyberattacks that put millions of people at risk. Even more worryingly, hackers continue to exploit telecoms operators even after the issue became public. Governments and affected companies must prioritize addressing this threat and patching the backdoors used by these cybercriminals. We are witnessing one of the largest intelligence leaks in American history.
Do you think current laws on encryption and legal access are adequate to protect your privacy? Please write to us Cyberguy.com/contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Reports newsletter: Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to CyberGuy’s most frequently asked questions:
New news from Kurt:
Copyright 2024 CyberGuy.com. all rights reserved.