Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»China Attack on U.S. Telecom Networks: ‘Thousands and Thousands’ of Devices Need to Be Replaced

    China Attack on U.S. Telecom Networks: ‘Thousands and Thousands’ of Devices Need to Be Replaced

    November 25, 2024

    China U.S. telecom networks hacked

    China-linked threat actors are still inside U.S. telecom networks, and evicting them will require replacing “thousands and thousands and thousands” of network devices, according to the chairman of the Senate Intelligence Committee.

    The breach of U.S. telecom networks by the Salt Typhoon threat group went on for more than a year in some cases, Sen. Mark R. Warner (D-Virginia) told the Washington Post, and while only 150 victims have been notified so far, the total could eventually number in the “millions.”

    Warner, a former telecom venture capitalist, called the breaches the “worst telecom hack in our nation’s history – by far.”

    U.S. Telecom Breach Will Require Replacing ‘Thousands’ of Routers and Switches

    The telecom network hacks that led to the infiltration of the U.S. court wiretap system and targeted the phone data of top U.S. officials – including President-elect Donald Trump, running mate JD Vance, top congressional and government officials, and the campaign of Vice President Kamala Harris – remain ongoing and will require a massive cleanup effort, according to Warner.

    Warner told the Post that the networks are still compromised, and that fixing them could involve physically replacing “literally thousands and thousands and thousands” of routers and switches.

    “Unlike some of the European countries where you might have a single telco, our networks are a hodgepodge of old networks,” Warner said. “The big networks are combinations of a whole series of acquisitions, and you have equipment out there that’s so old it’s unpatchable.”

    AT&T, Verizon and Lumen Technologies appear to have been hit harder in the attacks than T-Mobile, which has claimed “no evidence of impacts to customer information.”

    Top national security officials met with telecom industry executives late last week “to hear from telecommunications sector executives on how the U.S. Government can partner with and support the private sector on hardening against sophisticated nation state attacks,” suggesting a possible cooperative effort to clean up the mess.

    And it’s not just China attacking U.S. telecom networks. Cyble dark web researchers have identified more than 50 credible claims of telecom breaches by threat actors this year.

    Preparation for Cyber Warfare?

    CISA said earlier this year that China-linked threat actors – particularly Volt Typhoon at the time – were targeting communications, energy, transportation systems, and water and wastewater systems in the U.S. and its territories in what may be preparations for cyber warfare:

    “Volt Typhoon’s choice of targets and pattern of behavior is not consistent with traditional cyber espionage or intelligence gathering operations, and the U.S. authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions. The U.S. authoring agencies are concerned about the potential for these actors to use their network access for disruptive effects in the event of potential geopolitical tensions and/or military conflicts.”

    Those comments closely followed an unusual FBI and Department of Justice operation to fix vulnerable routers that were being used by People’s Republic of China (PRC) threat actors to target U.S. critical infrastructure, and FBI Director Christopher Wray has also echoed CISA’s concerns.

    U.S. Cyber Command Executive Director Morgan Adamski told the CYBERWARCON conference last week that the Cyber National Mission Force has been deployed 85 times in the last year to combat cyber threats from the PRC and other adversaries, a significant increase from its 22 missions the year before.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCustomer Service Expert Wati.io Scales Up on MongoDB
    Next Article FlipaClip animation app data breach exposes details of almost 900,000 users

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    HTML Boilerplate: A Complete Guide for Beginners

    Web Development

    How to Download 7-Zip for Windows 11 on ARM

    Development

    Easily deploy and manage hundreds of LoRA adapters with SageMaker efficient multi-adapter inference

    Development

    5 Quick Ways to Fix the DirectX 12 Black Screen

    Operating Systems
    Hostinger

    Highlights

    My favorite Garmin feature comes to its new Forerunner watch

    May 15, 2025

    The feature-rich Forerunner 570 and Forerunner 970 continue blurring the line between fitness bands and…

    Best Practices for Responsive Web Design

    November 26, 2024

    13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

    January 21, 2025

    TigerOS – Portuguese Fedora remix

    January 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.