On-Prem

Networks

T-Mobile US 'monitoring' China's 'industry-wide attack' amid fresh security breach fears

Un-carrier said to be among those hit by Salt Typhoon, including AT&T, Verizon


updated T-Mobile US said it is "monitoring" an "industry-wide" cyber-espionage campaign against American networks – amid fears Chinese government-backed spies compromised the un-carrier along with various other telecommunications providers.

On Friday, the Wall Street Journal reported T-Mo was among those hit in a months-long effort by the Chinese to snoop on high-value intelligence targets via their cellphone communications. China's Salt Typhoon team broke into Verizon, AT&T, and Lumen Technologies, among others, it is reported.

A T-Mobile US spokesperson on Monday did not confirm nor deny it too had fallen victim to Salt Typhoon, telling The Register simply: "T-Mobile is closely monitoring this industry-wide attack." Can we take that as a yes?

The telecoms giant has seen "no significant impacts to T-Mobile systems or data," the spokesperson told us. "We have no evidence of access or exfiltration of any customer or other sensitive information as other companies may have experienced. We will continue to monitor this closely, working with industry peers and the relevant authorities."

T-Mo's disclosure comes less than a week after the FBI and the US govt's Cybersecurity and Infrastructure Security Agency (CISA) confirmed "a broad and significant cyber espionage campaign" had been conducted by Beijing-linked snoops against "multiple" telecommunications providers' networks.

While the official statement from the Feds did not specifically name the People's Republic of China spy crew, an email from the FBI to The Register said the security advisory was the government agencies' statement on Salt Typhoon.

The FBI and CISA noted that the cyber-attacks the telecoms providers resulted in the "theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to US law enforcement requests pursuant to court orders."

Previous reports suggested that the Chinese snoops, after breaking into the telcos' networks, accessed the wiretapping backdoor-like systems used for court-ordered surveillance and targeted phones belonging to people affiliated with US Democratic presidential candidate Kamala Harris, as well as Republican president-elect Donald Trump and VP-elect JD Vance.

T-Mobile US, which has been breached at least seven times since 2018, in September agreed to pay $31.5 million to improve its cybersecurity and pay a civil penalty after a series of network intrusions affected millions of customers. 

This amount included a legal settlement with the FCC, requiring the carrier to pay $15.75 million as a civil penalty to the US Treasury. T-Mo will also spend $15.75 million over the next two years to beef up its infosec program. ®

Updated to add at 2300 UTC on November 20, 2024

T-Mobile's oddly worded statement about the suspected Salt Typhoon "industry-wide attack" now makes a whole lot more sense.

Unnamed sources told Bloomberg that the carrier contained the security breach before the alleged Chinese cyberspies got to customers' phones. These sources said intruders compromised "edge-routing infrastructure and gained unauthorized access to a limited number of devices, including a T-Mobile-owned-and-operated router."

The telecommunications firm, however, spotted and booted the spies before they could do any real damage to T-Mobile systems, data, or customers' devices, according to the news report.

Send us news
2 Comments

More telcos confirm China Salt Typhoon security breaches as White House weighs in

Intrusions allowed Beijing to 'geolocate millions of individuals, record phone calls at will'

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid

OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop

Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim list

Slow drip of compromised telecom networks continues

Akamai to quit its CDN in China, seemingly not due to trouble from Beijing

Security and cloud compute have so much more upside than the boring business of shifting bits

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

China's cyber intrusions took a sinister turn in 2024

From targeted espionage to pre-positioning - not that they are mutually exclusive

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog