Close Menu
  • Home
  • Economic News
  • Stock Market
  • Real Estate
  • Crypto
  • Investment
  • Personal Finance
  • Retirement
  • Banking

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

We Want One Solution, But One Solution Can’t Solve Our Polycrisis

March 2, 2026

28 Interior Design Tips to Make Your Home Feel Effortless

March 2, 2026

CZR Exchange Partners with Flux to Make DApps Development Seamless And Faster Using Decentralized Cloud Infrastructure

March 2, 2026
Facebook X (Twitter) Instagram
  • Contact Us
  • Privacy Policy
  • Terms Of Service
Monday, March 2
Doorpickers
Facebook X (Twitter) Instagram
  • Home
  • Economic News
  • Stock Market
  • Real Estate
  • Crypto
  • Investment
  • Personal Finance
  • Retirement
  • Banking
Doorpickers
Home»Economic News»China-Linked Hackers Breached 8 US Telecom Companies, White House Says
Economic News

China-Linked Hackers Breached 8 US Telecom Companies, White House Says

December 5, 2024No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Authored by Frank Fang via The Epoch Times,

According to a top White House official, Chinese state-sponsored hackers have successfully compromised at least eight U.S. telecommunication companies. Anne Neuberger, deputy national security adviser for cyber and emerging technologies, revealed that a threat actor group known as “Salt Typhoon” is responsible for the breaches, with targets including senior U.S. government officials and prominent political figures.

Neuberger reassured that no classified communications have been compromised, but the threat of ongoing compromises to communications remains until U.S. companies address the cybersecurity gaps exploited by the Chinese hackers.

The breached telecommunications companies have not fully removed the Chinese actors from their networks, indicating a continued risk of compromise until the security gaps are addressed.

Efforts are being made to enhance cybersecurity in various sectors, following the recent ransomware attack on Colonial Pipeline. Neuberger emphasized the importance of implementing minimum cybersecurity practices to prevent future intrusions by threat actors like Salt Typhoon.

The FBI, Cybersecurity and Infrastructure Security Agency (CISA), and other international partners have issued guidelines for protecting communication infrastructures following the Chinese hacking incident. However, there is no definite timeline on when the Chinese hackers could be entirely removed from U.S. telecom networks.

Legislation has been proposed to combat growing threats from the Chinese Communist Party against U.S. critical infrastructure. If enacted, the Strengthening Cyber Resilience Against State-Sponsored Threats Act would establish an interagency task force led by CISA and the FBI to address cybersecurity threats posed by China’s state-sponsored cyber threat groups.

Loading…

Breached ChinaLinked Companies Hackers House Telecom White
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

We Want One Solution, But One Solution Can’t Solve Our Polycrisis

March 2, 2026

Poland Plans Social Media Ban For Under-15s

March 2, 2026

Joe Biden Makes Insane Claim That He Reduced Illegal Immigration

March 1, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Can I Buy a House With a 600 Credit Score?

August 2, 20250 Views

Uniswap Labs to pay a fine to CFTC for illegally offering crypto derivatives trading

September 4, 20240 Views

Veteran Trader Peter Brandt Sees Bitcoin Flashing Bearish Signal, Warns BTC Crashing Below $80,000 a Possibility

December 21, 20243 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest
Economic News

We Want One Solution, But One Solution Can’t Solve Our Polycrisis

March 2, 20260
Real Estate

28 Interior Design Tips to Make Your Home Feel Effortless

March 2, 20260
Crypto

CZR Exchange Partners with Flux to Make DApps Development Seamless And Faster Using Decentralized Cloud Infrastructure

March 2, 20260
Facebook X (Twitter) Instagram Pinterest
  • Contact Us
  • Privacy Policy
  • Terms Of Service
© 2026 doorpickers.com - All rights reserved

Type above and press Enter to search. Press Esc to cancel.