Sunday, 27 Jul 2025
Exclusive insights, data, and analysis for financial market experts.
Explore Now
Asia Business News
  • Home
  • Business
  • Finance
  • Technology
  • Medical
  • Politics
  • Breaking News
Subscribe
  • China
  • firm
  • South
  • Tariffs
  • Startup
  • market
  • Indian
  • President
  • Trump
  • Healthcare
Asia Business NewsAsia Business News
Font ResizerAa
  • Read History
  • Environment
  • Business
  • Politics
  • Finance
  • Technology
Search
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • Read History
  • Categories
    • Business
    • Politics
    • Technology
    • Environment
    • Finance
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Business

Use encryption to protect Chinese phones from hackers

Asia Business News
Last updated: July 25, 2025 2:45 pm
By Asia Business News
Share
5 Min Read
SHARE

U.S. telecommunications systems have been so compromised by Chinese hackers that senior government officials have been told to abandon routine phone calls and text messages.

this Cybersecurity and Infrastructure Security Agency issues warning Wednesday saw the most widespread hack ever by Chinese cyber espionage.

The report states that “individuals holding senior government or senior political positions” should “immediately review and apply” best practices regarding the use of mobile devices.

See also: US wants to ban sales of Chinese TP-Link routers: report

The first tip is: “Only use end-to-end encrypted communications.”

End-to-end encryption is a data protection technology designed to make data unreadable by anyone except the sender and recipient. iMessage and the privacy-focused app Signal.

Reuters said that enterprise products that allow end-to-end encryption also include online meetings of Microsoft Teams and Zoom Communications.

Neither regular calls nor text messages are end-to-end encrypted, which means they can be monitored by the phone company, law enforcement, or by hackers who may hack into the phone company’s infrastructure.

That’s what happened in the case of the cyber espionage group known as Salt Typhoon, a group that U.S. officials say is run by the Chinese government and obtained troves of data about U.S. callers.

Beijing often denies accusations of cyber espionage.

“The largest hacker attack in U.S. history”

But a senior U.S. official said earlier this month that “at least” eight telecommunications and telecommunications infrastructure companies in the United States were attacked by Typhoon Salt hackers and that “a large amount of Americans’ metadata” was stolen in surveillance scans.

Democratic Senator Ben Ray Lujan said last week that the intrusions “could represent a The largest telecom hacking attack in our country’s history”.

Family members of US President-elect Trump and officials in Joe Biden’s administration is the target.

It’s unclear whether U.S. officials have found a way to thwart the hackers’ espionage efforts.

Jeff Greene, CISA’s executive assistant director for cybersecurity, told reporters on Wednesday that the investigation is still ongoing and that various target agencies and personnel are in different stages of response.

Green said the Salt Typhoon attack “is part of a broader pattern of Chinese activity targeting critical infrastructure.” nickname to track.

“This is an ongoing activity by China that we need to prepare and defend for the long term,” Green said.

“A huge lawsuit against U.S. telecom companies”

Communicating solely through end-to-end encryption has long been a recommendation from digital security experts, such as those from the United States. Electronic Frontier FoundationIts senior technical expert, Cooper Quintin, welcomed the guidance. Still, he said the idea that the government was steering its own officials away from regular phone networks was concerning.

“This is a huge indictment of the telecommunications companies that operate the nation’s infrastructure,” he said.

Other recommendations include avoiding the use of one-time password-based texts, such as those often sent by Bank of America to verify logins, and using hardware keys, which can help prevent a password-stealing technique known as phishing.

Tom Hegel, threat researcher at cybersecurity firm Sentinel One Cooper echoed the CISA guidance’s endorsement, saying “Chinese actors are not the only ones who continue to collect unsecured communications.”

Spies and hackers of all kinds “will lose valuable access if their targets adopt these security measures,” he said.

  • Additional editing and input by Jim Pollard, Reuters

See also

Chinese hackers hacked into U.S. courts to wiretap networks: Wall Street Journal

China behind U.S. online election campaign: Researchers

Chinese hackers target Russian state network, IT companies – BC

Chinese hackers behind malicious cyber operations: Australia

U.S. clears Chinese hackers from Pacific Computer Systems

U.S. says China is using artificial intelligence to boost espionage – Wall Street Journal

China faces WikiLeaks-style crisis from hacker firm data

Amid tariff spat, Trump ‘invites China’s Xi Jinping to take office’

Jim Pollard

Jim Pollard is an Australian journalist based in Thailand since 1999. He served as a senior editor at The Nation for more than 17 years.

Contents
“The largest hacker attack in U.S. history”“A huge lawsuit against U.S. telecom companies”
TAGGED:ChineseencryptionhackersPhonesProtect
Share This Article
Email Copy Link Print
Previous Article Ito Household’s 7 & i Returns To Essentials To Prevent $47 Billion Requisition Proposal From Circle K Proprietor
Next Article Israeli cybersecurity start-up Gutsy rebrands as Minimus

Subscribe Newsletter

Subscribe to our newsletter to get our newest articles instantly!
XFollow
InstagramFollow
LinkedInFollow
MediumFollow
RSS FeedFollow

Top News

Breaking News

Billionaire Benioff’s Salesforce To Spend $1 Billion In Singapore

July 27, 2025
Finance

Baidu to Deal Ernie Chatbot Free Of Charge Amidst DeepSeek Difficulty

March 19, 2025
Tech

Angkas gas up for PH competition with Grab

March 19, 2025
Medical

Many thanks to a brand-new collaboration with the area’s state college.

March 19, 2025

You May also Like

Business

BYD shares rise after DeepSeek’s driver-assist launch

July 21, 2025
Business

Chocolate Finance takes $374m hit in 2-week withdrawal spree

March 26, 2025
Business

Indian B2B fintech Rupifi to increase $146m in bridge round

May 16, 2025
Business

Worldwide SaaS purchase company Zinit spends $2m in India growth

May 3, 2025
Show More
  • More News:
  • China
  • firm
  • South
  • Tariffs
  • Startup
  • market
  • Indian
  • President
  • Trump
  • Healthcare
  • Chinese
  • Million
  • Billionaire
  • Hospital
  • Asia
  • Korean
  • Tech
  • India
  • Global
  • Health
Asia Business News

Asia Business News (ISSN: 3079-8531) is a leading international business publication dedicated to delivering in-depth analysis, expert insights, and comprehensive coverage of economic trends, corporate developments, and market dynamics across the Asia-Pacific region and beyond. With a commitment to journalistic integrity and analytical rigor, Asia Business News serves as a trusted source of information for business leaders, policymakers, and investors seeking authoritative perspectives on global commerce, finance, and industry advancements.

Rss

About Company

  • Contact Us
  • Advertise with US
  • Complaint
  • Privacy Policy
  • Cookie Policy
  • Submit a Tip

© 2025 Asia Business News (ISSN: 3079-8531). All rights reserved.

This publication, including but not limited to all articles, reports, analyses, graphics, images, designs, and any other content, is the exclusive intellectual property of Asia Business News (ISSN: 3079-8531). Unauthorized reproduction, distribution, transmission, display, or publication of any portion of this content, in any form or by any means, including but not limited to electronic, mechanical, photocopying, recording, or any information storage and retrieval system, without the prior written consent of the publisher, is strictly prohibited.

Welcome to Foxiz
Username or Email Address
Password

Lost your password?