NEWSLETTER

Sign up to read weekly email newsletter
Asia Tech Times
Donate
Search
  • Home
  • Breaking News
  • Business
  • Finance
  • Medical
  • Political
Reading: Use encryption to protect Chinese phones from hackers
Share
Font ResizerAa
Asia Tech TimesAsia Tech Times
  • Finance
  • Technology
Search
  • Home
  • Categories
    • Finance
    • Technology
  • More Foxiz
    • Blog Index
    • Forums
    • Complaint
    • Sitemap
Follow US
Made by ThemeRuby using the Foxiz theme. Powered by WordPress
Business

Use encryption to protect Chinese phones from hackers

By Asia Tech Times
Last updated: 25/07/2025
5 Min Read
Share

U.S. telecommunications systems have been so compromised by Chinese hackers that senior government officials have been told to abandon routine phone calls and text messages.

this Cybersecurity and Infrastructure Security Agency issues warning Wednesday saw the most widespread hack ever by Chinese cyber espionage.

The report states that “individuals holding senior government or senior political positions” should “immediately review and apply” best practices regarding the use of mobile devices.

See also: US wants to ban sales of Chinese TP-Link routers: report

The first tip is: “Only use end-to-end encrypted communications.”

End-to-end encryption is a data protection technology designed to make data unreadable by anyone except the sender and recipient. iMessage and the privacy-focused app Signal.

Reuters said that enterprise products that allow end-to-end encryption also include online meetings of Microsoft Teams and Zoom Communications.

Neither regular calls nor text messages are end-to-end encrypted, which means they can be monitored by the phone company, law enforcement, or by hackers who may hack into the phone company’s infrastructure.

That’s what happened in the case of the cyber espionage group known as Salt Typhoon, a group that U.S. officials say is run by the Chinese government and obtained troves of data about U.S. callers.

Beijing often denies accusations of cyber espionage.

“The largest hacker attack in U.S. history”

But a senior U.S. official said earlier this month that “at least” eight telecommunications and telecommunications infrastructure companies in the United States were attacked by Typhoon Salt hackers and that “a large amount of Americans’ metadata” was stolen in surveillance scans.

Democratic Senator Ben Ray Lujan said last week that the intrusions “could represent a The largest telecom hacking attack in our country’s history”.

Family members of US President-elect Trump and officials in Joe Biden’s administration is the target.

It’s unclear whether U.S. officials have found a way to thwart the hackers’ espionage efforts.

Jeff Greene, CISA’s executive assistant director for cybersecurity, told reporters on Wednesday that the investigation is still ongoing and that various target agencies and personnel are in different stages of response.

Green said the Salt Typhoon attack “is part of a broader pattern of Chinese activity targeting critical infrastructure.” nickname to track.

“This is an ongoing activity by China that we need to prepare and defend for the long term,” Green said.

“A huge lawsuit against U.S. telecom companies”

Communicating solely through end-to-end encryption has long been a recommendation from digital security experts, such as those from the United States. Electronic Frontier FoundationIts senior technical expert, Cooper Quintin, welcomed the guidance. Still, he said the idea that the government was steering its own officials away from regular phone networks was concerning.

“This is a huge indictment of the telecommunications companies that operate the nation’s infrastructure,” he said.

Other recommendations include avoiding the use of one-time password-based texts, such as those often sent by Bank of America to verify logins, and using hardware keys, which can help prevent a password-stealing technique known as phishing.

Tom Hegel, threat researcher at cybersecurity firm Sentinel One Cooper echoed the CISA guidance’s endorsement, saying “Chinese actors are not the only ones who continue to collect unsecured communications.”

Spies and hackers of all kinds “will lose valuable access if their targets adopt these security measures,” he said.

  • Additional editing and input by Jim Pollard, Reuters

See also

Chinese hackers hacked into U.S. courts to wiretap networks: Wall Street Journal

China behind U.S. online election campaign: Researchers

Chinese hackers target Russian state network, IT companies – BC

Chinese hackers behind malicious cyber operations: Australia

U.S. clears Chinese hackers from Pacific Computer Systems

U.S. says China is using artificial intelligence to boost espionage – Wall Street Journal

China faces WikiLeaks-style crisis from hacker firm data

Amid tariff spat, Trump ‘invites China’s Xi Jinping to take office’

Jim Pollard

Jim Pollard is an Australian journalist based in Thailand since 1999. He served as a senior editor at The Nation for more than 17 years.

Contents
See also: US wants to ban sales of Chinese TP-Link routers: report“The largest hacker attack in U.S. history”“A huge lawsuit against U.S. telecom companies”See alsoChinese hackers hacked into U.S. courts to wiretap networks: Wall Street JournalChina behind U.S. online election campaign: ResearchersChinese hackers target Russian state network, IT companies – BCChinese hackers behind malicious cyber operations: AustraliaU.S. clears Chinese hackers from Pacific Computer SystemsU.S. says China is using artificial intelligence to boost espionage – Wall Street JournalChina faces WikiLeaks-style crisis from hacker firm dataAmid tariff spat, Trump ‘invites China’s Xi Jinping to take office’Jim PollardLeave a Comment
TAGGED:ChineseencryptionhackersPhonesprotect

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print

SUBSCRIBE NOW

Subscribe to our newsletter to get our newest articles instantly!

HOT NEWS

Syfe quotes $40.7 m to get Australian system Selfwealth

In 2024, Syfe introduced an approach for development via purchase.

27/09/2025

China’s CATL Really feels the Pinch of a Lithium Cost Downturn it Developed

Years of long-lasting decreases in lithium costs are currently beginning to take a toll on…

19/03/2025

OpenAI strategies Sora video clip generator combination right into ChatGPT

Sora was released in December 2024 as a standalone internet application, making it possible for…

19/03/2025

YOU MAY ALSO LIKE

JD.com releases food distribution with commission-free deal

The business intends to utilize its logistics to obtain same-day or next-day food distribution solutions.

Business
26/09/2025

BMW files a claim against BYD over’M 6′ hallmark disagreement in Indonesia

BMW asserts that Grain’s use the “M6” name might deceive customers regarding the credibility and top quality of the item.

Business
23/08/2025

Saudi start-up system launches to link start-ups, financiers

Jaree is presently approving applications from Saudi Arabia-based start-ups and financiers.

Business
17/07/2025

ASML Q1 orders miss out on projection as AI, profession fears expand

The overview is shrouded by alleviating the prospective effect of AI chip need and united state profession plan.

Business
02/08/2025

Asia Tech Times (ISSN: 3079-8566) stands as a preeminent authority in technology journalism, delivering profound insights and strategic intelligence on the technological advancements shaping the Asia-Pacific region and beyond. Renowned for its depth of analysis and editorial excellence, the publication serves as a critical nexus for industry leaders, policymakers, scholars, and innovators navigating the evolving digital landscape.

  • Jobs Board
  • About Us
  • Contact Us
  • Privacy Policy
  • Exclusives
  • Learn How
  • Support
  • Solutions
  • Terms And Conditions
  • Editorial Policy
  • Marketing Solutions
  • Industry Intelligence

Follow US: 

Copyright © 2025 Asia Tech Times. All Rights Reserved.

All content published by Asia Tech Times (ISSN: 3079-8566), including but not limited to articles, reports, editorials, graphics, images, logos, and digital media, is the exclusive intellectual property of Asia Tech Times and is protected under international copyright laws and treaties.

Asia Tech TimesAsia Tech Times
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?