A large-scale cyber-espionage operation by a Chinese hacking group, known as “Salt Typhoon,” has resulted in the theft of Americans’ metadata, a senior U.S. official revealed. The exact number of affected individuals has not been disclosed, but the attack, which targeted U.S. telecommunications systems, is still ongoing.
The official confirmed that a significant amount of metadata, which is information about phone calls rather than the content of the calls themselves, has been stolen. “We believe a large number of Americans’ metadata was taken,” the official said. When asked if the hack affected every American’s cellphone records, the official explained that while it wasn’t every phone, it likely involved many individuals who were particularly targeted.
Telecom Companies Among Those Affected
The hacking campaign, which has targeted companies around the globe, has affected at least eight U.S.-based telecommunications firms, including major players like Verizon, AT&T, T-Mobile, and Lumen Technologies.
Although T-Mobile and Lumen have denied any breach of customer data, other reports suggest that hackers accessed call record metadata and possibly even telephone audio intercepts. This kind of metadata can provide detailed insights into a person’s life, from the people they communicate with to their locations and daily activities.
Anne Neuberger, Deputy National Security Adviser for Cyber and Emerging Technology, confirmed that eight U.S. telecom companies were targeted, though the identities of some firms are still being kept secret.
Global Reach and Strategic Concerns
Salt Typhoon’s attacks have not been confined to the U.S.; telecommunications systems in many countries worldwide have been compromised. Neuberger stated that the hackers’ goal was to collect metadata to identify individuals who could be future targets for more invasive surveillance.
The sophistication of the attack shows the persistence of advanced hacking groups, capable of infiltrating deep into complex networks. Neuberger noted that, despite ongoing efforts to mitigate the threat, U.S. telecom companies have not fully removed the hackers from their systems. She warned that unless cybersecurity gaps are addressed, the Chinese hackers could maintain their access.
China’s Rejection of Allegations and U.S. Response
China has repeatedly denied any involvement in cyber-espionage, and it rejected the latest allegations from the U.S. as unfounded. A Chinese embassy spokesperson stated that “China firmly opposes the U.S.’s smear attacks against China without any factual basis.”
In response, U.S. officials are making Salt Typhoon a top priority. President Joe Biden has been briefed multiple times on the ongoing cyber threat, underscoring the U.S. government’s commitment to addressing the issue.
An Escalating Threat
Experts have long warned about China’s interest in hacking global telecom systems. However, the Salt Typhoon campaign has become more intense in the past two years, with the hackers exploiting weaknesses in telecom infrastructure to access sensitive data on a massive scale.
Call record metadata—the “who, what, when, and where” of phone calls—can offer an in-depth look into individuals’ behaviors, social connections, and movements, even without revealing the content of the conversations. The bulk collection of such data is especially concerning, as it can lead to the profiling of individuals at a granular level.
Due to the scale of the breach, a classified briefing was held for U.S. senators. Key officials from the National Security Council, FBI, Cybersecurity and Infrastructure Security Agency, and other agencies provided detailed information on the attack. Avril Haines, Director of National Intelligence, and Jessica Rosenworcel, Chair of the Federal Communications Commission, were among those in attendance.