CISA warns China-linked hacking group continues long-running campaign against 80 countries

A secret cyber operation has been running for years without most people knowing. Since at least 2019, hackers linked to China have been breaking into networks around the world. Their main targets were telecom companies.

A Silent Hack That Lasted for Years

By breaking into routers and core systems, they gained the power to see and hear private communications.

This allowed the hackers to steal personal data, track calls and texts, and even follow the movements of people across countries. They also reached into sensitive areas like court-approved wiretaps. Experts say this was not a quick smash-and-grab. Instead, it was a patient and careful campaign that went deep into infrastructure.

What makes this more alarming is how widespread the impact is. More than 80 countries were hit, covering not just phone networks but also government agencies, transport systems, hotels, and even parts of military infrastructure. Millions of ordinary people may have been caught up in the attack without ever realizing it.

High-Profile Targets and U.S. Telecom Breaches

The hackers did not stop at everyday citizens. They also went after top leaders in the United States. Phones used during the 2024 election campaign were hacked through a major telecom provider’s system. Investigators later confirmed that this attack exposed calls, texts, and location data of not just the direct victims but also everyone who communicated with them.

Bridgestone Hit by Suspicious Cyberattack as Operations Disrupted in US and Canada

This means the ripple effect could reach millions of people. If one person was hacked, all their contacts became vulnerable too.

Telecom giants in the U.S., including Verizon, AT&T, and T-Mobile, were among those breached. These networks carry massive amounts of daily communication, which means the hackers may have had access to conversations and movements across the country. Investigators described the breach as one of the most serious cyber espionage cases in U.S. history.

Global Scale and Official Reactions

The cyber group behind the attack is known as Salt Typhoon. It has been linked to Chinese intelligence services and works through companies that provide hacking tools. However, Chinese officials denied any involvement and claimed they oppose all forms of cybercrime.

Authorities in the United States and other nations began piecing together the scale of the breach in 2024. The FBI first spotted the attacks after noticing suspicious activity around hacked phones. Soon after, government agencies across more than 20 countries released a joint warning confirming that the campaign had spread worldwide.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

In May 2025, lawmakers in the U.S. urged the Homeland Security Department to restore a cyber safety board that had been disbanded earlier in the year. They argued that such oversight is needed to investigate and prevent more breaches. By late August 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a public warning that the campaign was still ongoing.

Experts have called the attack the worst telecom hack in American history. They say it marks a shift from earlier cyber thefts of trade secrets to deeper and more dangerous attempts to control the systems that keep global communications running.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Food Giants Call It “Efficiency” — Workers Call It Tens of Thousands of Layoffs

The food and beverage industry experienced a very difficult...

Greene breaks GOP silence, denounces Trump’s handling of Rob Reiner tragedy

The reported deaths of filmmaker Rob Reiner and his...

Maria Shriver lashes out at Trump over comments made after Reiner family tragedy

Maria Shriver expressed deep anger and frustration over President...

Iran-linked hackers weaponize doxxing and bounties in escalating cyber war on Israelis

An Iran-linked hacker group has launched an online campaign...

GAO report backs AOC’s warning on Puerto Rico tax breaks costing taxpayers hundreds of millions

A new government report has revealed that a special...

SEC quietly pulls back on crypto enforcement as Trump-linked companies catch a break

A significant change has taken place in how the...

McKinsey faces sweeping job cuts as consulting giant confronts slowing growth at 100

As McKinsey & Co. celebrates 100 years, the firm...

Security researchers warn that some sideloaded Kindle e-books may contain hidden malware

A new cybersecurity warning has raised concerns for Kindle...

Noem shifts blame to ICE as Trump administration grows impatient with deportation pace

Department of Homeland Security Secretary Kristi Noem is facing...

Stanford experiment shows AI hacker ARTEMIS outperforms highly paid human cybersecurity experts

An artificial intelligence system has achieved a major milestone...

Related Articles

Popular Categories

error: Content is protected !!