Chinese hackers allegedly hit US wiretap systems to hit broadband networks

Giant eye watching at man working at the computer. Surveillance, hacking, internet security concept. Flat vector illustration.
(Image credit: Moor Studio via Getty Images)

In an all too predictable turn of events, Salt Typhoon, an infamous Chinese state actor, has reportedly hijacked government systems to breach several American broadband providers and gain access to the interception portals required by US law.

Research by the Wall Street Journal has revealed amongst those breached were US telecoms giants Verizon and AT&T, as well as ISP Lumen Technologies, where hackers may have had access to a ‘vast collection of internet traffic’ for months, including court-ordered wiretaps collected in the name of national security.

The US has long pressured telecoms companies to develop infrastructure for ‘lawful interception’ so that they can access communications from network users, but of course, if the access systems exist, they can be exploited.

All’s fair in love and backdoors

China unequivocally denies the allegations that it uses hackers to access government information, and said that the US has concocted a ‘false narrative’ to frame China in the past.

Salt Typhoon recently hit the headlines for another suspected attack on American ISPs, and due to its name, has been linked to other Chinese state-sponsored groups, all of which Microsoft named ‘typhoon’ - Flax Typhoon, Volt Typhoon, and Brass Typhoon, which are reportedly working in coordination to assist the Chinese government in achieving its geo-political goals, including a possible invasion of Taiwan.

As technology becomes even more integrated in our day-to-day lives, the capacity for surveillance and spyware only expands. Major telecommunications firms are forced to ‘cooperate’ in the name of national security by building backdoors for law enforcement or turn devices into ‘spy machines’.

Regardless of your opinion on your own government using surveillance techniques on its own people, the existence of these access systems mean that they can be compromised by threat actors or tech companies and used without your consent.

The US surveillance machine is not just contained within the states either, as these invasions are often used against foreigners living overseas, meaning no one is out of reach for Big Brother.

To try and mitigate this, we've listed the best VPN services around to help keep your information private.

More from TechRadar Pro

Ellen Jennings-Trace
Staff Writer

Ellen has been writing for almost four years, with a focus on post-COVID policy whilst studying for BA Politics and International Relations at the University of Cardiff, followed by an MA in Political Communication. Before joining TechRadar Pro as a Junior Writer, she worked for Future Publishing’s MVC content team, working with merchants and retailers to upload content.

Read more
Flag of the People's Republic of China overlaid with a technological network of wires and circuits.
Salt Typhoon attacks may have hit more US firms than previously thought
An American flag flying outside the US Capitol building against a blue sky
Chinese cybersecurity firm sanctioned by US Treasury over alleged links to Salt Typhoon hackers
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
China
US Government officials urged to lock down devices amid telecoms breach
China
AT&T and Verizon say they're free of Salt Typhoon hacks at last, as further victims identified
China
Salt Typhoon strikes again - more US ISPs, universities and telecoms networks hit by Chinese hackers
Latest in Pro
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Gmail at 20
Your Gmail search results are about to get a huge change - and I'm not sure you're going to be happy with it
A person holding out their hand with a digital AI symbol.
Taking AI to the edge for smaller, smarter, and more secure applications
Someone looking at a marketing graph
Why ‘boring’ tech will be 2025's biggest marketing trend
TinEye website
I like this reverse image search service the most
Epos Expand Vision 5 Bundle main image
I tested the Epos Expand Vision 5 Bundle - read why this video conferencing solution is recommended
Latest in News
Using Zipped files and folders in Windows 11
Windows 11 should soon be faster at extracting files from compressed ZIPs – and it’s about time, frankly
The player prepares for a fight in Metal Eden.
I loved the bits of Metal Eden that I played and soon you'll be able to try it too thanks to this upcoming free demo
Apple iPhone 16 Pro HANDS ON
The iPhone 18 might get a major chip upgrade after all
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Oppo Watch Mini X2 teaser
Oppo Watch X2 Mini teaser could be our first glimpse of the smaller OnePlus Watch 3
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
A fresh Samsung Galaxy S25 Edge benchmark leak has eased my worries about its performance