Latest from Network Reliability/Testing & Assurance/Cybersecurity/Safety

ID 339944244 © Dzmitry Auramchik | Dreamstime.com
An advanced cybersecurity defense mechanism that protects data and digital operations from emerging cyber AI generated
Photo 199442954 © Claramfreelance | Dreamstime.com
ID 230983056 © Rokas Tenys | Dreamstime.com
670d59a6d208992dba8ce07f Dreamstime S 230983056

Bipartisan House Letter Presses Telcos Following Salt Typhoon Cyberattack

Oct. 14, 2024
The letter came from House Energy and Commerce Committee leaders and seeks answers from the companies.

While the NSA is investigating the China-linked Salt Typhoon hack on U.S. internet service providers, a bipartisan group of lawmakers in Washington are calling out the leadership of the three affected telcos, according to a press release.

Members of the House Energy and Commerce Committee, including Chair Cathy McMorris Rodgers (R-WA), Frank Pallone, Jr. (D-NJ), as well as Communications and Technology Subcommittee Chair Bob Latta (R-OH) and member Doris Matsui (D-CA), penned a letter to the telcos affected by the breach, AT&T, Verizon, and Lumen, looking for answers, as well as a briefing, on what happened.

“We are concerned by the recent reports of a massive breach of AT&T, Verizon, and Lumen’s communications networks by Chinese hackers," said the letter. "These types of breaches are increasing in frequency and severity, and there is a growing concern regarding the cybersecurity vulnerabilities embedded in U.S. telecommunications networks. The Committee needs to understand better how this incident occurred and what steps your company is taking to prevent future service disruptions and secure your customers’ data.”

The hackers reportedly had successfully breached parts of AT&T, Verizon, and Lumen’s network infrastructure used to respond to government wiretap requests in an attempt to gain information.

During the months long hack, which the Wall Street Journal called a potentially catastrophic breach, the hackers may have also had access enabling them to spy on portions of generic internet traffic.