The Register: T-Mobile US CSO: Spies jumped from one telco to another in a way ‘I’ve not seen in my career’

Source URL: https://www.theregister.com/2024/12/05/tmobile_cso_telecom_attack/
Source: The Register
Title: T-Mobile US CSO: Spies jumped from one telco to another in a way ‘I’ve not seen in my career’

Feedly Summary: Security chief talks to El Reg as Feds urge everyone to use encrypted chat
interview While Chinese-government-backed spies maintained access to US telecommunications providers’ networks for months – and in some cases still haven’t been booted out – T-Mobile US thwarted successful attacks on its systems “within a single-digit number of days," according to the carrier’s security boss Jeff Simon.…

AI Summary and Description: Yes

Summary: The text describes a recent cyber-espionage campaign targeting US telecommunications providers by a Chinese government-backed group called Salt Typhoon. T-Mobile US’s Chief Security Officer, Jeff Simon, highlights the unique nature of the techniques employed in these intrusions and emphasizes their layered defense strategy to thwart these attacks, while urging strong encryption practices for data protection.

Detailed Description:
The article delves into a significant cyber-espionage incident involving Chinese state-sponsored hackers and US telecommunications firms. Here are the major points covered:

– **Attack Overview**:
– Chinese government-backed group Salt Typhoon successfully infiltrated several US telecom companies, including Verizon, AT&T, and Lumen Technologies.
– T-Mobile US was targeted but managed to thwart successful intrusions promptly.

– **Infiltration Techniques**:
– Although the attackers did not utilize zero-day exploits or known vulnerabilities, the techniques employed were described as “novel” and different from those typically seen in the cybersecurity field.
– Simon noted that the attackers compromised an unnamed wireline provider’s network, which was connected to T-Mobile US.

– **Response and Mitigation**:
– T-Mobile US’s layered defense strategy was effective in blocking unauthorized access and protecting customer data.
– There was no breach of sensitive customer information, such as calls or texts.

– **Ongoing Concerns**:
– FBI and CISA officials indicated uncertainty regarding whether the attackers had been completely evicted from networks, highlighting the need for vigilance.
– Simon expressed confidence that the cyber-spies remained outside T-Mobile US’s systems.

– **Crisis Management**:
– Upon detecting suspicious activity, T-Mobile US promptly notified federal authorities and other telecom operators.
– Simon underscored the importance of robust controls to assume some degree of success against sophisticated adversaries.

– **Utilization of FIDO2 Authentication**:
– T-Mobile US employs FIDO2 authentication for employees, significantly complicating credential theft.
– Regular rotation of credentials when FIDO2 can’t be used was mentioned, which slows down attackers when they gain access.

– **Encryption Advocacy**:
– As a precautionary measure, US cybersecurity officials have advocated for strong encryption of communications to protect against data theft and surveillance.
– The government advises against using plain text for communications, promoting encryption as a crucial defense mechanism.

In summary, the content highlights critical aspects of cybersecurity in telecommunications, particularly the implications of state-sponsored attacks and the importance of proactive defense strategies and encryption in safeguarding sensitive information.