Security

CSO

T-Mobile US takes a victory lap after stopping cyberattacks: 'Other providers may be seeing different outcomes'

Funny what putting more effort and resources into IT security can do


Attackers - possibly China's Salt Typhoon cyber-espionage crew - compromised an unnamed wireline provider's network and used this access to try to break into T-Mobile US systems multiple times over the past few weeks, according to its Chief Security Officer Jeff Simon. 

Simon was among the telecom execs who met White House officials last week to discuss the recent spate of Chinese intrusions into telecoms networks.

Today, the un-carrier's security boss took a victory lap around his fellow operators, and detailed how T-Mo ultimately thwarted the attacks from advancing and disrupting services.

Salt Typhoon compromised "multiple" US telcos in its extensive snooping campaign, and this allegedly included Verizon, AT&T, and Lumen Technologies, although all three have thus far declined to comment.

According to the Feds, the crew compromised systems used for performing communications wiretapping for law enforcement, and stole customers' call records, phone calls, and texts - including private communications between government officials - during this espionage endeavor. However, "this is not the case at T-Mobile," Simon said in a write-up. 

The attackers (T-Mob can't definitely attribute these to Salt Typhoon) did not access any sensitive customer data, such as calls, voicemail messages, and texts, he added.

While the carrier did detect "attempts to infiltrate our systems by bad actors," according to Simon, "we quickly severed connectivity to the [wireline] provider's network as we believe it was – and may still be – compromised." 

T-Mobile US hasn't seen any previous attempts like this, and as of now, the miscreants appear to have been kicked out of the mobile carrier's network, we're told.

"Simply put, our defenses worked as designed," Simon said. "Other providers may be seeing different outcomes."

It's a welcome reverse course for T-Mo, which has had its security breached at least seven times since 2018. In September, the telco agreed to fork out $31.5 million to improve its cybersecurity and pay a civil penalty after a series of network intrusions affected tens of millions of customers. 

It would appear at least that the improved infosec program is already starting to pay off. ®

Send us news
9 Comments

More telcos confirm China Salt Typhoon security breaches as White House weighs in

Intrusions allowed Beijing to 'geolocate millions of individuals, record phone calls at will'

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim list

Slow drip of compromised telecom networks continues

Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid

OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop

Akamai to quit its CDN in China, seemingly not due to trouble from Beijing

Security and cloud compute have so much more upside than the boring business of shifting bits

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

China's cyber intrusions took a sinister turn in 2024

From targeted espionage to pre-positioning - not that they are mutually exclusive

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog