Chinese Hackers Target Telecom Networks, Including T-Mobile, in Cyber-Espionage Campaign

https://icaro.icaromediagroup.com/system/images/photos/16399778/original/open-uri20241116-18-601t5b?1731777191
ICARO Media Group
News
16/11/2024 17h11

**Chinese Hackers Breach Multiple Telecom Networks, Including T-Mobile**

In a sweeping cyber-espionage campaign, Chinese hackers have infiltrated several U.S. and international telecommunications companies, including T-Mobile, as reported by The Wall Street Journal. The cybercriminals, linked to a Chinese intelligence agency, targeted T-Mobile's network to spy on cellphone communications of high-value intelligence targets over several months. The precise timing of the attacks was not disclosed.

A T-Mobile spokesperson revealed to Reuters that the company is vigilantly monitoring what has been described as an industry-wide attack. According to the spokesperson, T-Mobile's systems and data have not experienced significant impacts, and there is currently no evidence suggesting customer information has been compromised.

The extent of the breach into T-Mobile's systems remains uncertain, including whether any customer call details or communication records were accessed, as noted in the Wall Street Journal's coverage.

On Wednesday, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) confirmed that hackers with ties to China had managed to intercept surveillance data intended for use by American law enforcement agencies by breaching an unspecified number of telecom networks.

This incident is part of a broader pattern of cyber intrusions. Earlier in October, reports surfaced that Chinese hackers had also accessed networks belonging to U.S. broadband providers such as Verizon Communications, AT&T, and Lumen Technologies. These breaches allegedly allowed the hackers to extract information from systems used by the federal government for authorized wiretapping.

China has consistently denied accusations from the U.S. government and other entities regarding its use of hackers to infiltrate foreign computer networks.

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related