Chinese-sponsored groups are using the popular Brickstorm backdoor to access and gain persistence in government and tech firm networks, part of the ongoing effort by the PRC to establish long-term footholds in agency and critical infrastructure IT environments, according to a report by U.S. and Canadian security offices.
Two Trump-appointed FCC officials voted to undo the telecom industry's cybersecurity rules. One Democratic commissioner dissented, saying the decision leaves the United States "less safe" at a time when threats are increasing.
The Federal Communications Commission is set this week to vote on reversing cybersecurity rules for telecommunications providers that were put forward following the sweeping βSalt Typhoonβ hacks.
The FCCβs meeting on Thursday includes plans to consider an order to rescind a ruling and proposed rules published in the waning days of the Biden administration. The January ruling requires telecom operators to secure their networks under Section 105 of the Communications Assistance for Law Enforcement Act.
But current FCC Chairman Brendan Carr argues that ruling βexceeded the agencyβs authority and did not present an effective or agile response to the relevant cybersecurity threats.β
The proposed order would rescind the January ruling and withdraw proposed cybersecurity rules for telecom operators.
Instead, the FCC βshould instead continue to pursue an agile and collaborative approach to cybersecurity through federal-private partnerships that protect and secure communications networks and more targeted, legally sound rulemaking and enforcement,β according to a factsheet on the order of reconsideration.
βWorstβ hack ever
The Salt Typhoon campaign was revealed in 2024. It involved penetrating hacks into U.S. telecom networks and others across the globe. The hackers were reportedly able to target the communications of political figures and government officials, including then-candidate Donald Trump and running mate JD Vance.
U.S. officials have said Chinese-government sponsored hackers are behind the campaign. Senate Intelligence Committee Ranking Member Mark Warner (D-Va.) has described it as βthe worst telecommunications hack in our nationβs history.β
The Cybersecurity and Infrastructure Security Agency has since said the Salt Typhoon campaign overlapped with global threat activities targeting multiple sectors, including telecommunications, government, transportation, lodging, and military infrastructure networks.
βWhile these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and customer edge (CE) routers, they also leverage compromised devices and trusted connections to pivot into other networks,β CISA wrote in a September advisory. βThese actors often modify routers to maintain persistent, long-term access to networks.β
In rolling out the January rules, Biden administration officials argued they represented a βcritical step to require U.S. telecoms to improve cybersecurity to meet todayβs nation state threats, including those from Chinaβs well-resourced and sophisticated offensive cyber program.β
However, the FCCβs current leadership says the rules misinterpreted the law and βunnecessarily raised and purported to resolve issues that were not appropriate for consideration in the absence of public input.β The FCCβs factsheet also references the commissionβs βrecent engagement with providers and their agreement to take extensive steps to protect national security interests.β
In an October letter to the FCC, lawyers representing several telecom associations argued that the January ruling βwould significantly undermineβ public-private partnerships. They argued that telecom providers had voluntarily collaborated with federal agencies to investigate Salt Typhoon and adopted stronger cybersecurity measures.
Warner and Sen. Ron Wyden (D-Ore.) are also pressing the Department of Homeland Security to release an unclassified 2022 report on security vulnerabilities in the U.S. telecom sector. They argue that by not releasing the report, DHS is undermining public debate over how to best secure telecom networks in the wake of Salt Typhoon.
βThe Salt Typhoon compromise represents one of the most serious espionage campaigns against the communications of U.S. government leaders in history, and highlighted important gaps in our nationβs communications security β in some cases, with providers ignoring basic security precautions such as credential re-use across network appliances and failure to adopt multi-factor authentication for highly privileged network administrator accounts,β Warner and Wyden wrote in a recent letter to DHS and the Office of the Director of National Intelligence.
Meanwhile, the House on Monday passed the βStrengthening Cyber Resilience Against State-Sponsored Threats Act.β The bill would establish a joint interagency task force to address China-linked cyber threats, including Salt Typhoon. The task force would be led by CISA, with involvement from the Justice Department, the FBI and several sector-risk management agencies.
FILE - This June 19, 2015, file photo, shows the Federal Communications Commission building in Washington. The Federal Communications Commission has issued a $6 million fine against the political consultant who sent AI-generated robocalls mimicking President Joe Bidenβs voice to voters ahead of New Hampshireβs presidential primary. Steve Kramer also faces two dozen criminal charges in New Hampshire. Kramer has admitted orchestrating the message sent to thousands of voters. (AP Photo/Andrew Harnik, File)
The China-linked Salt Typhoon APT group attacked a European telecom via a Citrix NetScaler vulnerability in July 2025, Darktrace reports. This follows past US Army and telecom breaches.