this post was submitted on 17 Jan 2025
13 points (100.0% liked)

Technology

22 readers
18 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

!globalnews@lemmy.zip
!interestingshare@lemmy.zip


Icon attribution | Banner attribution

founded 1 year ago
MODERATORS
 

cross-posted from: https://beehaw.org/post/18055307

Archived link

Beijing's Salt Typhoon cyberspies had been seen in US government networks before telcos discovered the same foreign intruders in their own systems, according to CISA boss Jen Easterly.

Speaking at a Foundation for Defense of Democracies (FDD) event on Wednesday, the agency director said her threat hunters detected the Chinese government goons in federal networks before the far-reaching espionage campaign against people's telecommunications providers had been found and attributed to Salt Typhoon.

"We saw it as a separate campaign, called it another goofy cyber name, and we were able to, based on the visibility that we had within the federal networks, connect some dots," and tie the first set of snoops to the same crew that burrowed into AT&T, Verizon, and other telecoms firms' infrastructure, Easterly noted.

By compromising those telcos – specifically, the systems that allow the Feds to lawfully monitor criminal suspects [the U.S. Wiretap system} – Salt Typhoon had the capability to geolocate millions of subscribers, access people's internet traffic, and record phone calls at will.

This visibility into federal government networks, combined with private-industry tips coming into CISA, led to the FBI and other law enforcement agencies obtaining court-approved access to Salt-Typhoon-leased virtual private servers.

"That then led to cracking open the larger Salt Typhoon piece," Easterly said.

Still, she cautioned, "what we have found is likely just the tip of the iceberg" when it comes to Chinese intrusions into American critical infrastructure.

"China is the most persistent and serious cyber threat to the nation and to our national critical infrastructure," Easterly warned, adding that Salt Typhoon isn't her biggest worry when it comes to Middle Kingdom cyberthreats.

[...]

The public later learned that the same PRC-backed crew had compromised at least one large US city's emergency services network, been conducting reconnaissance on "multiple" American electric companies, and was still lurking inside power, water, and comms systems, preparing to "wreak havoc" on American infrastructure and "cause societal chaos" in the US.

top 3 comments
sorted by: hot top controversial new old
[–] possiblylinux127@lemmy.zip 2 points 16 hours ago

Let's blame China for the backdoor. I would be a little more understanding if the US wasn't doing cyber warfare on other countries and its own citizens.

[–] ChaoticNeutralCzech@feddit.org 4 points 1 day ago (1 children)

Don't get photographed in front of binary data, Braille signs, QR codes etc. you didn't make yourself.

[–] 1984 1 points 17 hours ago

Is there anything interested in this particular background?