Добавить новость

Партактив Краснознаменска поздравили участников СВО в одном из госпиталей Минобороны РФ

США ввели санкции против «Центра геополитических экспертиз» в Москве

«Волонтеры Подмосковья» поздравили С Новым годом пациентов больницы Биокомбината

В лесопарке «Шишкин лес» гостей радует елка-победительница областного конкурса



News in English


Новости сегодня

Новости от TheMoneytizer

What is Salt Typhoon? An expert explains the Chinese hackers, attacks on US networks

Cyberattacks linked to the Chinese government that compromised large portions of the American telecommunications network have the US government sounding the alarm. The chair of the Senate Intelligence Committee, Sen. Mark Warner (D-VA), has called it the “worst telecom hack in our nation’s history” and noted that it makes prior cyberattacks by Russian operatives look like “child’s play” by comparison.

The complex cyberattack, carried out by a group of Chinese hackers dubbed Salt Typhoon, began as far back as 2022. Its purpose, according to US officials, was to give Chinese operatives persistent access to telecommunications networks across the US by compromising devices like routers and switches run by companies like AT&T, Verizon, Lumen and others.

This attack comes on the heels of reports that the FBI and Cybersecurity and Infrastructure Security Agency were assisting telephone companies with countering other China-connected compromises of their networks. The earlier hacking was part of an attack targeting people in the Washington area in government or political roles, including candidates for the 2024 presidential election.

But Salt Typhoon is not just targeting Americans. Research from security vendor Trend Micro shows that attacks by Salt Typhoon compromised other critical infrastructure around the world in recent years. US officials have confirmed these findings as well — and their level of concern is noteworthy.

Chinese officials have denied the allegations that they’re behind this operation, as they have in response to allegations about previous cyberattacks.

As a cybersecurity researcher, I find this attack is indeed breathtaking in its scope and severity. But it’s not surprising that such an incident took place. Many organizations of all sizes still fail to follow good cybersecurity practices, have limited resources, or operate IT infrastructures that are too complex to effectively monitor, manage and secure.

Must Read

Chinese Salt Typhoon cyberespionage targets AT&T, Verizon but networks secure, carriers say

How bad is it?

Salt Typhoon exploited technical vulnerabilities in some of the cybersecurity products like firewalls used to protect large organizations. Once inside the network, the attackers used more conventional tools and knowledge to expand their reach, gather information, stay hidden and deploy malware for later use.

According to the FBI, Salt Typhoon allowed Chinese officials to obtain a large amount of records showing where, when and who specific individuals were communicating with. In some cases, they noted that Salt Typhoon gave access to the contents of phone calls and text messages as well.

Salt Typhoon also compromised the private portals, or backdoors, that telephone companies provide to law enforcement to request court-ordered monitoring of phone numbers pursuant to investigations. This is also the same portal that is used by US intelligence to surveil foreign targets inside the United States.

As a result, Salt Typhoon attackers may have obtained information about which Chinese spies and informants counterintelligence agencies were monitoring — knowledge that can help those targets try to evade such surveillance.

On December 3, the Cybersecurity and Infrastructure Security Agency, National Security Agency and FBI, along with their counterparts in Australia, New Zealand and Canada, released guidance to the public on how to address the Salt Typhoon attack. Their Enhanced Visibility and Hardening Guidance for Communications Infrastructure guide essentially reiterates best cybersecurity practices for organizations that could help mitigate the impact of Salt Typhoon or future copycat attacks.

It does, however, include recommendations to protect specific telecommunication equipment for some of the Cisco products that were targeted in this attack.

What can be done?

US officials have said that many of the ways Salt Typhoon penetrated its targets was through existing weaknesses with the infrastructure. As I’ve written previously, failing to implement basic cybersecurity best practices can lead to debilitating incidents for organizations of all sizes. Given how dependent the world is on networked information systems, it is more important than ever to maintain cybersecurity programs that make it difficult for attacks to succeed, especially for critical infrastructure like the phone network.

In addition to following the best practices guidance issued by the Cybersecurity and Infrastructure Security Agency earlier this week, organizations should remain vigilant. They should monitor not only the news for information about this attack but the various free, proprietary or private threat intelligence feeds and informal professional networks to stay up to date on attackers’ tactics and techniques — and ways to counter them.

Companies and governments should also ensure their IT departments and cybersecurity programs are adequately staffed and funded to meet their needs and ensure that best practices are implemented. The Federal Communications Commission is already threatening companies with fines for failing to bolster their defenses against Chinese hacking.

Although any illicit surveillance is concerning, the average American probably has little to worry about from Salt Typhoon. It’s unlikely that your family phone calls or text messages to friends are of interest to the Chinese government. However, if you want to increase your security and privacy a bit, consider using end-to-end encrypted messaging services like Signal, FaceTime or Messages.

Also make sure you’re not using default or easily guessed passwords on your devices, including your home router. And consider using two-factor authentication to further strengthen the security of any critical internet accounts.

Backdoors and bad guys

Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” — and efforts to require them are likely to backfire.

So it’s somewhat ironic that one of the countermeasures recommended by the government to guard against Salt Typhoon spying is to use strongly encrypted services for phone calls and text messages – encryption capabilities that it has spent decades trying to undermine so that only “the good guys” can use it. – Rappler.com

This article originally appeared on The Conversation.

Richard Forno, Principal Lecturer, CSEE & Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County

Must Read

Cybersecurity trends for 2025: The AI arms race continues, physical threats rise

Читайте на 123ru.net


Новости 24/7 DirectAdvert - доход для вашего сайта



Частные объявления в Вашем городе, в Вашем регионе и в России



Smi24.net — ежеминутные новости с ежедневным архивом. Только у нас — все главные новости дня без политической цензуры. "123 Новости" — абсолютно все точки зрения, трезвая аналитика, цивилизованные споры и обсуждения без взаимных обвинений и оскорблений. Помните, что не у всех точка зрения совпадает с Вашей. Уважайте мнение других, даже если Вы отстаиваете свой взгляд и свою позицию. Smi24.net — облегчённая версия старейшего обозревателя новостей 123ru.net. Мы не навязываем Вам своё видение, мы даём Вам срез событий дня без цензуры и без купюр. Новости, какие они есть —онлайн с поминутным архивом по всем городам и регионам России, Украины, Белоруссии и Абхазии. Smi24.net — живые новости в живом эфире! Быстрый поиск от Smi24.net — это не только возможность первым узнать, но и преимущество сообщить срочные новости мгновенно на любом языке мира и быть услышанным тут же. В любую минуту Вы можете добавить свою новость - здесь.




Новости от наших партнёров в Вашем городе

Ria.city

Космонавт Вагнер сфотографировал новогодний Нижний Новгород с МКС

Напились водки в Америке и устроили дебош в самолете? Как русские таланты вляпались в скандал на МЧМ

Какой сегодня праздник: 3 января отмечается несколько праздников, какой православный праздник сегодня

Самолет с 79 пассажирами выкатился за пределы полосы в Норильске

Музыкальные новости

В Подмосковье сотрудники Росгвардии задержали подозреваемого в краже дорогостоящих товаров из гипермаркета

Алексей Тузов для РБК Autonews: Эксперты назвали конец 2024 года идеальным временем для покупки машины

Радио Менеджер. Ротация песен на Радио.

Продвижение Песен, Музыки, Стихов ВКонтакте.

Новости России

От новинок до классики: какие фильмы и сериалы можно посмотреть за праздники

Инсайдер – Кыш Бабай: «Самый дорогой заказ у меня был на Рублевке у одного из очень богатых людей РФ»

Пять лет исполнилось городскому бренду «Молодой Нижний»

Прогулка в темноте, коллекция хлеба и собрание шифровальной техники: что можно увидеть в самых необычных музеях Москвы

Экология в России и мире

Что такое паводок, причины возникновения и чем он опасен

Подкаст "Женское дело. Лаборатория успеха". В гостях Ксения Подхватиловская

Продвижение Песен, Музыки, Стихов ВКонтакте.

Продать стихи. Как продать стихи. Продать стихи собственного сочинения. Где продать стихи.

Спорт в России и мире

Рублёв и Хачанов вышли в полуфинал турнира ATP в Гонконге в парном разряде

Теннисистка Петрова объяснила неудачный сезон Медведева поражением от Синнера

Кудерметова вышла в третий круг турнира WTA в Брисбене

Эрика Андреева проиграла Волынец в первом круге турнира WTA в Окленде

Moscow.media

Китайский кроссовер, который никто не хочет покупать, уходит с рынка России

В съехавшей с трассы "Тойоте" получили травмы две девочки

Врач рассказала, почему появляется седина и можно ли остановить этот процесс

Врач объяснил, чем опасно нарушение режима приема лекарств











Топ новостей на этот час

Rss.plus






Стены Марракеша на закате

Прогулка в темноте, коллекция хлеба и собрание шифровальной техники: что можно увидеть в самых необычных музеях Москвы

В Мытищах хотят построить новый мост через Клязьму

Космонавт Вагнер сфотографировал новогодний Нижний Новгород с МКС