CISA warns China-linked hacking group continues long-running campaign against 80 countries

A secret cyber operation has been running for years without most people knowing. Since at least 2019, hackers linked to China have been breaking into networks around the world. Their main targets were telecom companies.

A Silent Hack That Lasted for Years

By breaking into routers and core systems, they gained the power to see and hear private communications.

This allowed the hackers to steal personal data, track calls and texts, and even follow the movements of people across countries. They also reached into sensitive areas like court-approved wiretaps. Experts say this was not a quick smash-and-grab. Instead, it was a patient and careful campaign that went deep into infrastructure.

What makes this more alarming is how widespread the impact is. More than 80 countries were hit, covering not just phone networks but also government agencies, transport systems, hotels, and even parts of military infrastructure. Millions of ordinary people may have been caught up in the attack without ever realizing it.

High-Profile Targets and U.S. Telecom Breaches

The hackers did not stop at everyday citizens. They also went after top leaders in the United States. Phones used during the 2024 election campaign were hacked through a major telecom provider’s system. Investigators later confirmed that this attack exposed calls, texts, and location data of not just the direct victims but also everyone who communicated with them.

Bridgestone Hit by Suspicious Cyberattack as Operations Disrupted in US and Canada

This means the ripple effect could reach millions of people. If one person was hacked, all their contacts became vulnerable too.

Telecom giants in the U.S., including Verizon, AT&T, and T-Mobile, were among those breached. These networks carry massive amounts of daily communication, which means the hackers may have had access to conversations and movements across the country. Investigators described the breach as one of the most serious cyber espionage cases in U.S. history.

Global Scale and Official Reactions

The cyber group behind the attack is known as Salt Typhoon. It has been linked to Chinese intelligence services and works through companies that provide hacking tools. However, Chinese officials denied any involvement and claimed they oppose all forms of cybercrime.

Authorities in the United States and other nations began piecing together the scale of the breach in 2024. The FBI first spotted the attacks after noticing suspicious activity around hacked phones. Soon after, government agencies across more than 20 countries released a joint warning confirming that the campaign had spread worldwide.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

In May 2025, lawmakers in the U.S. urged the Homeland Security Department to restore a cyber safety board that had been disbanded earlier in the year. They argued that such oversight is needed to investigate and prevent more breaches. By late August 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a public warning that the campaign was still ongoing.

Experts have called the attack the worst telecom hack in American history. They say it marks a shift from earlier cyber thefts of trade secrets to deeper and more dangerous attempts to control the systems that keep global communications running.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Bernie Sanders warns AI push by Musk Zuckerberg and Altman focuses on wealth not public benefit

Senator Bernie Sanders Criticizes Tech Giants Over AI Push Senator...

FBI uncovers ‘terrorize ICE’ note, but Joshua Jahn’s family disputes anti-ICE narrative

On September 24, 2025, Joshua Jahn, a 29-year-old from...

Leaked emails expose Epstein’s $54M legal war chest — Dershowitz, Starr, Lefkowitz among defenders

Newly obtained private emails show the support and guidance...

Hackers tied to Rhysida gang demand 3.4 million ransom after Maryland Transit Administration breach

The Maryland Transit Administration (MTA) has been hit by...

Homeland Security sparks outrage as Pokémon Company warns of legal action over viral ICE video

The Pokémon Company International has spoken out against a...

Newsom boosts Ocasio-Cortez into national spotlight with Prop 50 campaign

Rep. Alexandria Ocasio-Cortez, often known as AOC, is once...

Trump explodes at Harris over ‘closest election’ remark — calls her ‘dumb as a rock

Former Vice President Kamala Harris is once again at...

Project Veritas drops Epstein nuke — DOJ distances itself as claims of Trump cover-up go viral

A senior government investigator was secretly recorded making explosive...

Seedify halts SFUND trading after hackers steal 1.2 million affecting thousands of holders

The cryptocurrency world faced a shocking blow on September...

Collins Aerospace hacked — Berlin and Heathrow descend into travel chaos

A major disruption has hit airlines and passengers across...

Related Articles

Popular Categories

error: Content is protected !!