Other
Salt Typhoon AT&T / Verizon / Lumen Telecom Espionage (Confirmed)
Primary Source βIncident Details
Salt Typhoon (China MSS) breached at least 9 US telecom carriers including AT&T, Verizon, T-Mobile, Lumen, Spectrum, Consolidated Communications, and Windstream. Active for 1-2 years before September 2024 discovery. Attackers accessed CALEA wiretap systems, obtaining a near-complete list of US law enforcement wiretap targets β a major counterintelligence failure. Call metadata for 1M+ users (mostly DC metro area) was accessed. Audio calls of high-profile targets (Trump, Vance, Harris campaign staff) were recorded. AT&T and Verizon confirmed the breach in December 2024. Described as ‘worst telecom hack in US history.’ Note: this entry covers the three confirmed US telcos; see separate entry for the broader Salt Typhoon critical infrastructure campaign.
Technical Details
- Initial Attack Vector
- Chinese MSS-linked Salt Typhoon APT exploited vulnerabilities in telecom network infrastructure including Cisco routers; leveraged CALEA wiretap backdoor access and a Windows kernel-mode rootkit (Demodex) for persistence
- Vendor / Product
- Cisco IOS routers; CALEA lawful intercept systems
- Malware Family
- Demodex (kernel-mode rootkit)
Timeline
- 2023-01-01 Breach occurred
- 2024-10-06 Publicly disclosed
- 2025-01-01 Customers notified