Telcos Struggle To Boot Chinese Hackers From Networks (axios.com) 46
China-linked spies are still lurking inside U.S. telecommunications networks roughly six months after American officials started investigating the intrusions, senior officials told reporters Tuesday. From a report: This is the first time U.S. officials have confirmed reports that Salt Typhoon hackers still have access to critical infrastructure -- and they're proving difficult to kick out. Officials added that they don't yet know the full scope of the intrusions, despite starting the investigation in late spring.
The Cybersecurity and Infrastructure Security Agency and FBI released guidance Tuesday for the communications sector to harden their networks against Chinese state-sponsored hackers. The guide includes basic steps like maintaining logs of activity on the network, keeping an inventory of all devices in the telecom's environment and changing any default equipment passwords. The hack has given Salt Typhoon unprecedented access to records from U.S. telecommunications networks about who Americans are communicating with, a senior FBI official told reporters during a briefing.
The Cybersecurity and Infrastructure Security Agency and FBI released guidance Tuesday for the communications sector to harden their networks against Chinese state-sponsored hackers. The guide includes basic steps like maintaining logs of activity on the network, keeping an inventory of all devices in the telecom's environment and changing any default equipment passwords. The hack has given Salt Typhoon unprecedented access to records from U.S. telecommunications networks about who Americans are communicating with, a senior FBI official told reporters during a briefing.
lawful access (Score:5, Insightful)
National embarrassment.
Re: lawful access (Score:1)
What are you referring to, there are no public details on which providers were compromised or how. People are straight up imagining some nefarious intentional security backdoor for law enforcement that doesn't exist because that's not how anything works, not for law enforcement, not for intelligence gathering, etc.
For one, your idea presupposes that telecoms networks are otherwise impenetrable. Until we know more, that's fucking retarded, frankly.
Re: (Score:2)
https://techcrunch.com/2024/10... [techcrunch.com]
Re: (Score:2)
There are racks of government spying equipment wired to every phone exchange in the US. They have access to everything. People who work in telecoms are not even publicly allowed to admit this equipment exists.
Anyway it's setup and managed by government spooks who don't know what they are doing and rely on threats to keep it protected. Those threats don't work on people physically located in uncooperative countries.
Re: (Score:2)
Just to add to the danger, after el Bunko and his merry band of racists set up their concentration camps for migrants, what do we think will happen to those camps? They''ll have contracts to private sector companies to "help" run them, and those companies will want to keep the gravy train flowing. So once the migrants are shipped back to their home counties to accept new employment in the drug trade, they'll be needing some new "migrants" to populate the camps.
Where will they get these new undesirables? Hmm
Prevent mass surveillance (Score:2)
If all surveillance has to be approved by a central office, the system is reasonably protected. If the password is shared with entire police departments so automated mass surveillance can continue, nothing has changed.
While a central office prevents automated mass surveillance, the basic problem remains: Anyone can say "I'm a cop, this is urgent: Tell me about phone number X". One cyber-intruder can do that 1,000 times a month, and after 6 months, he's got information on all senior bureaucrats and mil
Re: (Score:3)
If all surveillance has to be approved by a central office, the system is reasonably protected. If the password is shared with entire police departments so automated mass surveillance can continue, nothing has changed.
While a central office prevents automated mass surveillance, the basic problem remains: Anyone can say "I'm a cop, this is urgent: Tell me about phone number X". One cyber-intruder can do that 1,000 times a month, and after 6 months, he's got information on all senior bureaucrats and military personnel in the USA.
The problem - IMHO - isn't access. It's that the data is gathered in the first place. Maybe a cop gets impersonated. Or a department phished. Or a server hacked.
It doesn't matter how, it only matters that the data exists to be accessed. I get it... it's juicy. Knowing who a suspect interacted with, and where they went is very, very attractive to law enforcement. Knowing where a missing child's phone was last seen is useful. Understanding who was around a terrorist event sounds great.
But to viola
Re: (Score:2)
slasdot ads (Score:1, Offtopic)
Must be a change in chromium but I see lots of ads on slashdot now, even with the Disable Ads box checked.
These ads slow down the site substantially and hurt the site.
Frankly, the Temu ads are creepy. I'm not sure what they are selling exactly, AI pictures of school girls? What fucking creepers buy that shit? Why am I seeing this?
Seeing ads in one thing, seeing ads that have some inappropriate angle is just creepy and weird. Slashdot has always been a bit weird and troll-y, but never lecherous.
Hey slashdot,
Re: (Score:2)
Re: (Score:2)
Chrome is built on the Chromium code base. You got that backwards
Re: (Score:2)
They are recruitment ads for Donald's New and Improved Lout-Swamp.
-5 Political Troll
Re: (Score:3)
Yup, they changed something so Slashdot is all ad based now apparently, regardless of "disabled ads". No announcement about this though... It's probably your typical third party ad broker service, where you can't curate what's shown on your own site.
And it's on Firefox as well, it's not Chrome.
I agree, Temu is weird. It's nice that if there is anything good about AI it gets corrupted by generating provocative Anime pictures.
Re: (Score:2)
If it was obviously meant to be Anime I wouldn't complain. These Temu ads are showing some obviously AI generated pictures but approaching the uncanny valley.
I think my original point stands, no one is buying from these ads, and thus the ads provide no benefit. I'm fine if Temu throws its money away on bad generated ads, but I'm not fine seeing them.
Re: (Score:2)
Oh, it's not necessarily Temu doing this, or Slashdot. It's the middle man making the money, promising tons of views to one party and revenue to the other party.
Advertising isn't really a science, despite it being in high tech, in that you can't directly correlate advertising costs to increased revenue or gauge how effective advertising on Slashdot really is. It's very likely many companies are overpaying on their ads. In the early dotcom this was definitely true, as costs per view on the internet were t
Re: (Score:2)
I think my original point stands, no one is buying from these ads, and thus the ads provide no benefit.
I don't know what makes you so confident about that.
The for-profit entities with concrete data on the ad cost, clickthrough numbers, and sale conversion rates can trivially assess whether a given ad is cost effective, and they're choosing to spend more money on them. I don't have any reason to believe they're behaving an in economically irrational manner and knowingly throwing away money.
Re: (Score:2)
If you block them at the network level by DNS blackhole for known ad networks, there isn't a damn thing Slashdot or the browser can do about it.
I see no ads here, running an AdGuard Home docker container as a DNS proxy.
Re: (Score:2)
Disabling javascript for slasdot.org seems to have helped. Trying to send their ad networks to 127.0.0.1 broke the site completely.
Re: (Score:2)
Whatever floats their junk (Score:1)
The hack has given Salt Typhoon unprecedented access to records from U.S. telecommunications networks about who Americans are communicating with
I hope China is really enjoying knowing when my partner gets off work, and how we're sometimes indecisive about what we're having for dinner. Truly, a great cause for national security concern. /s
Re: (Score:2, Troll)
This is the Great President Xi. I know you two like to boink each other with cold bacon on your love-parts, and if you don't call the 'Lago Tribble Top and tell him to stop with his foolish tariffs, the whole world will know about your bacon fetish! You've been warned, Dear American."
Re: (Score:3, Funny)
Dear president Pooh,
I hope the whole oppressive regime thing is going well and this message finds you in good health. While I can certainly sympathize with your concerns, unfortunately my social credit score is too low for my grievances to be acknowledged by my county's leadership. Perhaps you would have success with a person of greater influence, such as Leon Musk. I believe he presently has business relations with your county's manufacturing sectors, so you should already have his contact information.
Mu
Re: (Score:2)
P.S. We're having lasagna for dinner. Probably.
bacon and cheese?
Re:Whatever floats their junk (Score:4, Interesting)
I expect the real world concern is that the Chinese notice that some engineer at Lockheed is making a lot of out-of-hours calls to a young woman that's not his wife, and decide to ask for "favors" to keep that observation quiet.
Given the nature of the Slashdot audience, I imagine there are at least a handful of people of reading this with access to critical systems, who could do some damage if extorted by telecom-derived kompromat.
here we go with usual narrative peddling (Score:1, Insightful)
Why does slashdot pretend china, russia, iran and north korea are the only hackers?
We know that WE are ALL affected more by Israeli hackers and those they sell their products to.
Re: (Score:1, Troll)
But Israel knows how to kiss up to US evangelicals, so we turn a blind eye to them.
They are merely giving us (Score:2)
...a free reminder that our car's extended warranty is about to expire. Such nice people.
That's what you get... (Score:2, Funny)
Meanwhile: ongoing attacks from China (Score:3)
A couple of my webservers are currently under attack from a very dumb bot.
My daily log analysis showed a large number of ssh login attempts from a couple of Chinese /24 networks. The bot is very dumb because I set some rules to drop all packets from those /24 blocks (they were already rate-limited by fail2ban), but the bots continue the attack.
Re: (Score:1)
Redirect them to a honeypot and mess with them!
Re: (Score:2)
One month I had over 50,000 login attempts from a single address in China. That finally drove me to install sshguard.
Re: (Score:2)
No fix (Score:5, Insightful)
Re: No fix (Score:2)
What backdoor? Seriously, where did you read that?
Re: No fix (Score:5, Informative)
Re: (Score:2)
Remember how outraged people were when China passed a law stating that telecoms companies had to assist law enforcement and security services in getting access to user data? Or that citizen's data had to be stored in China, not abroad?
Re: (Score:2)
While I'm sure everyone likes the back door... (Score:2, Interesting)
Turn it off and not on again? (Score:1)
Re: (Score:1)
But then they'd have difficulty feigning incompetence while continuing to illegally sell my data to my enemies.