Defense News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Defense Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
DefenseNewsChinese Telecom Hackers Likely Holding Stolen Data ‘in Perpetuity’ for Later Attempts, FBI Official Says
Chinese Telecom Hackers Likely Holding Stolen Data ‘in Perpetuity’ for Later Attempts, FBI Official Says
DefenseCybersecurity

Chinese Telecom Hackers Likely Holding Stolen Data ‘in Perpetuity’ for Later Attempts, FBI Official Says

•February 19, 2026
0
FCW (GovExec Technology)
FCW (GovExec Technology)•Feb 19, 2026

Companies Mentioned

Verizon

Verizon

VZ

AT&T

AT&T

T

Why It Matters

Retaining such vast personal and governmental data gives China a long‑term intelligence asset that can fuel future cyber‑espionage and fraud, threatening national security and consumer privacy.

Key Takeaways

  • •Salt Typhoon breached dozens of global telecom operators.
  • •Over one million Americans' data exfiltrated.
  • •Stolen data likely retained indefinitely for future attacks.
  • •FBI warns potential surveillance and fraud uses.
  • •Lawmakers push for telecom transparency and security reforms.

Pulse Analysis

Salt Typhoon, the moniker for a Chinese state‑sponsored hacking unit, has been quietly harvesting telecom data for years. First publicly identified in 2024, investigators trace its activity back to at least 2019, when the group slipped into the lawful‑intercept infrastructure that powers court‑ordered wiretaps. By compromising the backbone of carrier networks in the United States, Norway, the United Kingdom and dozens of other nations, Salt Typhoon gained unfettered access to voice calls, metadata and privileged communications of high‑level officials, creating a treasure trove of intelligence that rivals traditional espionage methods.

The FBI’s warning that the exfiltrated data will be held "in perpetuity" underscores a strategic shift in cyber‑espionage: rather than using stolen information immediately, adversaries stockpile it to refine future exploits, conduct targeted phishing, or sell it on underground markets. Persistent data stores enable the creation of custom malware tailored to specific victims, amplify surveillance capabilities, and fuel identity‑theft schemes that can erode public trust. For a foreign power, such a repository offers a low‑cost, high‑value asset that can be weaponized across multiple campaigns, extending the impact of a single breach far beyond its initial scope.

Policy makers and telecom providers are now grappling with how to mitigate this lingering threat. Congressional leaders, including Sen. Maria Cantwell, have pressured carriers like Verizon and AT&T to release intelligence reports, while regulators push for stricter supply‑chain vetting and real‑time breach detection. The episode highlights the need for a coordinated response that blends robust encryption, zero‑trust architectures, and international cooperation to dismantle persistent threat actors. As nations reassess their cyber‑defense postures, the Salt Typhoon case serves as a stark reminder that the battle for data sovereignty is ongoing and increasingly complex.

Chinese telecom hackers likely holding stolen data ‘in perpetuity’ for later attempts, FBI official says

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...