Other

Salt Typhoon AT&T / Verizon / Lumen Telecom Espionage (Confirmed)

πŸ“… 2023-01-01 🏒 Cisco IOS routers; CALEA lawful intercept systems 🦠 Demodex (kernel-mode rootkit)
Primary Source β†—

Incident Details

Salt Typhoon (China MSS) breached at least 9 US telecom carriers including AT&T, Verizon, T-Mobile, Lumen, Spectrum, Consolidated Communications, and Windstream. Active for 1-2 years before September 2024 discovery. Attackers accessed CALEA wiretap systems, obtaining a near-complete list of US law enforcement wiretap targets β€” a major counterintelligence failure. Call metadata for 1M+ users (mostly DC metro area) was accessed. Audio calls of high-profile targets (Trump, Vance, Harris campaign staff) were recorded. AT&T and Verizon confirmed the breach in December 2024. Described as ‘worst telecom hack in US history.’ Note: this entry covers the three confirmed US telcos; see separate entry for the broader Salt Typhoon critical infrastructure campaign.

Technical Details

Initial Attack Vector
Chinese MSS-linked Salt Typhoon APT exploited vulnerabilities in telecom network infrastructure including Cisco routers; leveraged CALEA wiretap backdoor access and a Windows kernel-mode rootkit (Demodex) for persistence
Vendor / Product
Cisco IOS routers; CALEA lawful intercept systems
Malware Family
Demodex (kernel-mode rootkit)

Timeline

  1. 2023-01-01 Breach occurred
  2. 2024-10-06 Publicly disclosed
  3. 2025-01-01 Customers notified