FBI cyber cop: Salt Typhoon pwned 'nearly every American'
- Reference: 1756425551
- News link: https://www.theregister.co.uk/2025/08/28/fbi_cyber_cop_salt_typhoon/
- Source link:
"There's a good chance this espionage campaign has stolen information from nearly every American," Michael Machtinger, deputy assistant director for the FBI's cyber division, told The Register .
"There's a thought among the public that if you don't work in a sensitive area that the PRC might be interested in for its traditional espionage activities, then you are safe, they will not target you," he said, during a Thursday interview with The Register . "As we have seen from Salt Typhoon, this is no longer an assumption that anyone can afford to make."
[1]
The Beijing-backed spying campaign began at least in 2019 but wasn't [2]uncovered by US authorities until last fall. On Wednesday, US law enforcement and intelligence agencies along with those from 12 other countries warned the [3]ongoing espionage activity expanded far beyond [4]nine American telcos and [5]government networks . According to Machtinger, at least 80 countries were hit by the digital intrusions.
[6]
[7]
Around 200 American organizations were compromised by the espionage activity, Machtinger said, including the previously disclosed telecommunications firms such as [8]Verizon and AT&T .
Yesterday's joint security alert also pointed the allies' collective finger at three China-based entities affiliated with Salt Typhoon: [9]Sichuan Juxinhe Network Technology , Beijing Huanyu Tianqiong Information Technology, and Sichuan Zhixin Ruijie Network Technology. These companies, and likely others, provide cyber products and services to China's Ministry of State Security and People's Liberation Army, the governments said.
What the PRC is doing through these proxy actors is really reckless and unbounded, in a way that is significantly outside of the norms of what we see in the espionage space
"This is one of the most consequential cyber espionage breaches that we've ever seen in the United States," Machtinger said.
"What this really underscores is that what the PRC is doing through these proxy actors is really reckless and unbounded, in a way that is significantly outside of the norms of what we see in the espionage space," he added. "And that should really set off alarm bells for us — not only in the United States. The scale of indiscriminate targeting is unlike what we've seen in the past."
[10]
This indiscriminate targeting, as the FBI and White House security officials have previously noted, allowed Beijing’s snoops to geo-locate millions of mobile phone users, monitor their internet traffic, and, in some cases, [11]record their phone calls . Victims [12]reportedly included President Donald Trump and Vice President JD Vance.
Machtinger declined to confirm whether Trump and Vance were among those surveilled, but did say that victims included more than 100 current and former presidential administration officials.
"As we look at the impact on the different sets of victims," he said, Salt Typhoon collected "bulk information from millions of Americans."
[13]
For the more targeted group of individuals, "most of whom are very high-profile, current and former presidential administration officials, and campaign appointees from both major political parties," the data collection went much deeper, Machtinger added. "Down to intercepting actual content."
[14]If you thought China's Salt Typhoon was booted off critical networks, think again
[15]China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says
[16]This is the FBI, open up. China's Volt Typhoon is on your network
[17]How does China keep stealing our stuff, wonders DoD group responsible for keeping foreign agents out
In addition to Salt Typhoon, the feds over the past year have issued warnings about other Chinese cyber operations. These include [18]Volt Typhoon intruders , who infected hundreds of outdated routers to [19]build a botnet and break into US critical infrastructure facilities. The Beijing-backed crew, we would later learn, was prepositioning itself and [20]readying destructive cyberattacks .
Another China-linked crew, [21]Silk Typhoon has spent more than a decade compromising IT and cloud providers to steal sensitive data from their [22]government, technology , education, and legal and professional services customers.
China is not the only source of threats, Machtinger noted. Russia, Iran, North Korea, plus along with home-grown and international cybercriminals and ransomware crooks, assault computers and networks of both individuals and organizations, every day.
"These actors are going to continue their efforts, and they're going to get more sophisticated," Machtinger said. "We need to make sure that we, a nation, are taking cybersecurity seriously, updating systems, removing end-of-life devices, and making it as hard and costly as possible for the myriad of actors that are out there to successfully compromise." ®
Get our [23]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aLEl29VLpITvPuNhV1CnQwAAAEY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://www.theregister.com/2024/11/14/salt_typhoon_hacked_multiple_telecom/
[3] https://www.theregister.com/2025/08/28/china_salt_typhoon_alert/
[4] https://www.theregister.com/2025/01/06/charter_consolidated_windstream_salt_typhoon/
[5] https://www.theregister.com/2025/01/15/salt_typhoon_us_govt_networks/
[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aLEl29VLpITvPuNhV1CnQwAAAEY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aLEl29VLpITvPuNhV1CnQwAAAEY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[8] https://www.theregister.com/2024/12/30/att_verizon_confirm_salt_typhoon_breach/
[9] https://www.theregister.com/2025/01/17/fcc_telcos_calea/
[10] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aLEl29VLpITvPuNhV1CnQwAAAEY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[11] https://www.theregister.com/2024/12/09/white_house_salt_typhoon/
[12] https://www.theregister.com/2025/02/25/china_hacked_gop_emails/
[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aLEl29VLpITvPuNhV1CnQwAAAEY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[14] https://www.theregister.com/2025/08/28/china_salt_typhoon_alert/
[15] https://www.theregister.com/2025/01/15/salt_typhoon_us_govt_networks/
[16] https://www.theregister.com/2025/03/12/volt_tyhoon_experience_interview_with_gm/
[17] https://www.theregister.com/2025/08/28/how_does_china_keep_stealing/
[18] https://www.theregister.com/2024/01/30/fbi_china_volt/
[19] https://www.theregister.com/2024/01/31/volt_typhoon_botnet/
[20] https://www.theregister.com/2024/02/07/us_chinas_volt_typhoon_attacks/
[21] https://www.theregister.com/2025/03/06/fbi_china_pays_75k_per/
[22] https://www.theregister.com/2025/03/05/china_silk_typhoon_update/
[23] https://whitepapers.theregister.com/
This. Halfway through the article I stopped and went "wait a minute, how much of this information was collected by a domestic megacorp which then Salt Typhoon collected due to their sheer negligence?" We've had so many data breaches from data hoarding companies in the last decade that virtually everything on everyone from their medical records to credit card statements are public information now. I know Salt Typhoon is actively penetrating infrastructure, but I bet the bulk of the information they have on people is simply stuff corporations hoarded in insecure databases. This is like leaving a ton of rotting food out and then blaming the cockroaches infesting your house for your poor living conditions.
Boo Hoo, America
How does it feel?
>> Salt Typhoon collected "bulk information from millions of Americans."
And the USA collects bulk information from the whole world.
It would be nice if Jessica Lyons asked Machtinger a few questions, rather than acting as his mouthpiece. You see, if you want to be treated as a serious journalist you should ask difficult questions. Instead what we have here is FBI propaganda.
The USA is the threat to the world. It is not our friend. Those tariffs are not friendly. We won't forget.
Re: Boo Hoo, America
"The" threat? "A" threat, I'll give you that.
"There's a good chance this espionage campaign Google has stolen information from nearly every American,"