ALERT – Chinese Target Sensitive Data Across U.S.

Chinese hackers have successfully targeted a wide array of sensitive data during their recent cyber espionage campaign against U.S. telecommunications networks. Here are the specific types of data they were after:

  • Call Records: The hackers accessed extensive call logs, which included details about who users were communicating with, when the calls took place, and the locations from which these communications occurred.
  • Content of Communications: In some cases, the hackers were able to obtain actual audio recordings of calls and review text messages from specific high-profile individuals, including top government officials and political figures.
  • Personal Information of Users: The operation reportedly affected over 1 million customers, gathering personal information about a significant number of mobile phone users across major telecom providers like AT&T and Verizon.
  • Sensitive Law Enforcement Data: The hackers also gained access to information related to sensitive warrants pursued by the Department of Justice, raising concerns about their ability to identify individuals under investigation by federal authorities.

Recommendations

In light of these threats, CISA and the FBI have published guidance for network defenders. This includes best practices for enhancing visibility into network activity, identifying vulnerabilities, and securing communication infrastructures against potential compromises by PRC-affiliated actors. 

Key defense measures include:

  • Conduct thorough risk assessments: Identify vulnerabilities within your network and address them promptly.
  • Implement robust access controls: Limit access to sensitive systems and data to only those who need it.
  • Regularly update software and systems: Ensure that all software is up to date with the latest security patches.
  • Train employees on cybersecurity best practices: Foster a culture of security awareness within your organization.

CISA Best Practices online: Enhanced Visibility and Hardening Guidance for Communications Infrastructure

Need help? Managing cybersecurity is complex, requires expertise, and is changing 24×7. 

Contact DataLink today.
(410) 729-0440 | Email