Ethical Hacking News
US companies that collect digital ad data are enabling Chinese hackers to track American military and intelligence personnel, as part of the worst telecom breach in US history.
US companies collecting digital ad data are enabling Chinese hackers to track American military and intelligence personnel. The worst telecom breach in US history has exposed over a dozen US telecommunications companies to hacking. Cyber threats are emerging at an alarming rate across various sectors, highlighting the need for greater awareness and vigilance. A new Wi-Fi-hacking technique called "nearest neighbor attack" allows hackers to infiltrate targeted networks using nearby laptops. Foreign influence campaigns are being identified faster than ever, but there is still room for improvement in detection and response.
In a recent development that highlights the ever-evolving and increasingly sophisticated nature of cyber threats, a joint investigation by WIRED, Bayerischer Rundfunk (BR), and Netzpolitik.org has revealed that US companies legally collecting digital ad data are enabling adversaries to cheaply track American military and intelligence personnel. The investigation uncovered that Chinese government hackers have infiltrated over a dozen US telecommunications companies in what is being referred to as the worst telecom breach in American history.
The investigation, which was conducted by some of the most prominent names in cybersecurity journalism, sheds light on the alarming rate at which cyber threats are emerging across various sectors. It also highlights the need for greater awareness and vigilance among individuals and organizations when it comes to protecting sensitive information from falling into the wrong hands.
According to Senator Mark Warner of Virginia, chairman of the Senate Intelligence Committee, the hacking group known as Salt Typhoon has been able to eavesdrop on audio calls in real time and obtain millions of records of call and text metadata from targeted individuals. This is a significant escalation in terms of the sophistication and scope of cyber attacks, and it serves as a stark reminder of the ongoing threat that cybercrime poses.
The breach also raises serious questions about the level of security that has been implemented across various sectors to protect sensitive information. It appears that many organizations have not taken adequate measures to prevent such breaches from occurring in the first place.
Furthermore, the investigation highlights the alarming rate at which social media platforms are being used for nefarious purposes. In this case, Meta has disclosed its efforts to combat the forced-labor compounds driving the surge in pig butchering scams on its platforms. The company revealed that it has been quietly collaborating with global law enforcement, tech industry partners, and external experts for over two years to dismantle the crime syndicates behind these operations in Southeast Asia and the UAE.
Meanwhile, cybersecurity firm SpyCloud shared findings about publicly accessible black market services offering low-cost access to sensitive information on Chinese citizens. According to the firm's researchers, these services seem to obtain their data through insiders within Chinese surveillance agencies and government contractors, who sell their access.
Another significant development has emerged in the form of a novel Wi-Fi-hacking technique developed by a Russian hacking group. Dubbed a “nearest neighbor attack,” this method was uncovered during a 2022 investigation by cybersecurity firm Volexity into a network breach of an unnamed Washington, DC client. The technique involves taking control of a nearby laptop and using it as a bridge to infiltrate a targeted Wi-Fi network.
Finally, researchers explored how the US is calling out foreign influence campaigns faster than they ever have—but there’s plenty of room for improvement.
In conclusion, this investigation highlights the ongoing threat that cyber threats pose and serves as a stark reminder of the need for greater awareness and vigilance among individuals and organizations when it comes to protecting sensitive information from falling into the wrong hands. It also underscores the importance of collaboration between governments, tech industry partners, and external experts in combatting such threats.
US companies that collect digital ad data are enabling Chinese hackers to track American military and intelligence personnel, as part of the worst telecom breach in US history.
Related Information:
https://www.wired.com/story/andrew-tate-hack-undersea-cable-cut-iphone-graykey-salt-typhoon/
Published: Sat Nov 23 05:51:50 2024 by llama3.2 3B Q4_K_M