If you rely on standard green or blue text messages to run your business or chat with your family, the US government has a blunt message for you. Stop. Chinese state-sponsored hackers have compromised the backbone of major telecommunications networks, leaving standard phone calls and SMS completely exposed. The breach is severe enough that federal authorities are now advising the public to abandon traditional cell network communication entirely and switch to encrypted applications.
Hackers Inside the Lawful Intercept System
The attackers did not try to break into individual smartphones or guess user passwords. Instead, a hacking group known as Salt Typhoon successfully infiltrated the systems used by US telecommunications companies to comply with lawful wiretap requests. These gateways, originally mandated by the Communications Assistance for Law Enforcement Act of 1994, exist so authorities can legally monitor communications during criminal investigations. The hackers simply found the backdoor that the government built, picked the lock, and walked right in.
Initial reports of the intrusion emerged in early October 2024, revealing that the threat actors had established long-term persistence within the underlying router infrastructure. Affected carriers include major providers Verizon, AT&T, and Lumen Technologies. By compromising these top-tier networks, the attackers positioned themselves to intercept data flowing across the country before it ever reached its destination. The scale of the intrusion forced a rapid response from federal agencies, culminating in joint advisories from the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency.
This is a classic intelligence collection operation, but the scale and the depth of the access they achieved are deeply concerning.
The theft was highly targeted, focusing on specific high-profile individuals in government and politics, including staff members connected to presidential campaigns. While sensitive, classified government communications run on entirely separate and secured networks, the daily personal and professional text messages of influential figures were suddenly exposed. Officials note that this marks a shift in tactics for Chinese state-sponsored actors, moving away from disruptive attacks on power grids toward pure espionage and data collection.
The timeline of the federal response highlights the severity of the situation:
- October 5: Initial reports identify a breach of US telecommunications providers by the Salt Typhoon group.
- October 25: The FBI and CISA officially confirm an active investigation into the unauthorized access of commercial networks.
- November 13: A follow-up joint statement details the broad scope of the theft, confirming that customer call records were compromised.
- December 2024: Security agencies begin explicitly telling the public to route their messages through encrypted alternatives.

Why Standard Texts Are Now a Liability
Text messaging feels immediate and private, but standard SMS travels across global carrier networks entirely unencrypted. When you send a basic text message, the data bounces from your phone to a cell tower, routes through the carrier’s central servers, and is then delivered to the recipient. Because Salt Typhoon compromised those central servers, any message passing through them is visible in plain text. Industry standards indicate that approximately 98% of standard SMS messages remain completely unencrypted across global networks.
The vulnerability becomes especially obvious when crossing operating systems. Modern smartphones often feature built-in security, but it only works in closed ecosystems. Apple’s iMessage offers encryption when chatting with another iPhone user, but the moment you send a text from an Apple device to an Android phone, the system defaults back to standard SMS. This fallback mechanism creates a glaring loophole that hackers can easily exploit by tapping the carrier network directly.
Upgrading the entire cellular network to support encrypted text messaging natively would require overhauling decades of legacy infrastructure. It involves coordinating thousands of global carriers, standardizing new protocols, and ensuring older devices do not lose connectivity entirely. While companies are slowly rolling out newer standards like RCS, the immediate threat requires a faster solution. The government’s advice is practical: bypass the carrier network entirely by routing your messages through the internet.
| Communication Method | Encryption Status | Vulnerability to Network Breach |
|---|---|---|
| Standard SMS Texting | None | High (Easily intercepted) |
| Cellular Phone Calls | None | High (Targeted by wiretap exploits) |
| iMessage (Apple to Apple) | End-to-End Encrypted | Low (Secure from carrier tapping) |
| Signal / WhatsApp | End-to-End Encrypted | Low (Bypasses telecom networks) |
The reality is that any data passing through a compromised wiretap gateway is a liability. Until telecommunications providers can thoroughly audit their systems and evict the threat actors from their routers, standard cellular communication remains a risk for anyone discussing sensitive information.
The Shift to WhatsApp and Signal
Federal agencies are rarely specific about which commercial software you should install, but the Salt Typhoon breach forced a change in protocol. Security experts and government officials are explicitly advising users to shift to end-to-end encrypted messaging services to protect their daily conversations. End-to-end encryption ensures that a message is scrambled the moment it leaves your device and only unscrambled when it reaches the recipient. Even if a hacker intercepts the data stream at the carrier level, they will only see unreadable code.
For most people, the easiest transition is downloading established apps that already feature robust security by default. WhatsApp currently supports over 2 billion active monthly users, making it one of the most accessible options for staying in touch with friends and family. Signal, operated by the non-profit Signal Foundation, is widely regarded as the gold standard for privacy due to its open-source code and strict data retention policies. Both apps use your data connection or Wi-Fi to send messages, entirely sidestepping the compromised telecom gateways.
Beyond changing your messaging habits, CISA has rolled out broader guidelines to help mitigate the fallout from these network intrusions. Taking a few proactive steps can significantly narrow the window of opportunity for threat actors looking to exploit your devices:
- Always update your mobile operating system to the latest version to patch known vulnerabilities.
- Enable app-based two-factor authentication instead of relying on SMS verification codes.
- Avoid clicking on suspicious links in text messages, which could lead to secondary malware infections.
- Audit your mobile accounts and contact your carrier immediately if you notice unexplained changes to your call routing.
The telecommunications industry is currently operating under the Cyber Incident Reporting for Critical Infrastructure Act, which requires companies to report significant breaches to the government quickly. This regulatory pressure ensures that agencies can track the ongoing fallout, but it does not fix the immediate vulnerability on your smartphone. That responsibility currently falls to the user.
We are looking at a long road ahead before the national telecom infrastructure can be fully secured and trusted again. The tools designed to help law enforcement catch criminals were turned into weapons by foreign intelligence services, proving that backdoors are always a vulnerability. Taking control of your own data by moving away from traditional text messaging is the only practical defense you have today. Understanding how these network protocols function is key to your #CyberSecurity, especially as the fallout from the #SaltTyphoon breach continues to reshape how America communicates.
Disclaimer: Details in this article regarding the Salt Typhoon cyberattack and recommended security measures are based on official advisories from the FBI and CISA available at the time of writing. Cybersecurity threats evolve rapidly, and readers should consult official government security bulletins or verified IT professionals for the most current guidance on protecting personal data.