Security

CSO

T-Mobile US takes a victory lap after stopping cyberattacks: 'Other providers may be seeing different outcomes'

Funny what putting more effort and resources into IT security can do


Attackers - possibly China's Salt Typhoon cyber-espionage crew - compromised an unnamed wireline provider's network and used this access to try to break into T-Mobile US systems multiple times over the past few weeks, according to its Chief Security Officer Jeff Simon. 

Simon was among the telecom execs who met White House officials last week to discuss the recent spate of Chinese intrusions into telecoms networks.

Today, the un-carrier's security boss took a victory lap around his fellow operators, and detailed how T-Mo ultimately thwarted the attacks from advancing and disrupting services.

Salt Typhoon compromised "multiple" US telcos in its extensive snooping campaign, and this allegedly included Verizon, AT&T, and Lumen Technologies, although all three have thus far declined to comment.

According to the Feds, the crew compromised systems used for performing communications wiretapping for law enforcement, and stole customers' call records, phone calls, and texts - including private communications between government officials - during this espionage endeavor. However, "this is not the case at T-Mobile," Simon said in a write-up. 

The attackers (T-Mob can't definitely attribute these to Salt Typhoon) did not access any sensitive customer data, such as calls, voicemail messages, and texts, he added.

While the carrier did detect "attempts to infiltrate our systems by bad actors," according to Simon, "we quickly severed connectivity to the [wireline] provider's network as we believe it was – and may still be – compromised." 

T-Mobile US hasn't seen any previous attempts like this, and as of now, the miscreants appear to have been kicked out of the mobile carrier's network, we're told.

"Simply put, our defenses worked as designed," Simon said. "Other providers may be seeing different outcomes."

It's a welcome reverse course for T-Mo, which has had its security breached at least seven times since 2018. In September, the telco agreed to fork out $31.5 million to improve its cybersecurity and pay a civil penalty after a series of network intrusions affected tens of millions of customers. 

It would appear at least that the improved infosec program is already starting to pay off. ®

Send us news
9 Comments

How Chinese insiders are stealing data scooped up by President Xi's national surveillance system

'It's a double-edged sword,' security researchers tell The Reg

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

China's Salt Typhoon recorded top American officials' calls, says White House

No word yet on who was snooped on. Any bets?

T-Mobile US CSO: Spies jumped from one telco to another in a way 'I've not seen in my career'

Security chief talks to El Reg as Feds urge everyone to use encrypted chat

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting