Congress Targeted: Phishing Scam Hits Lawmakers Amidst Salt Typhoon Hack

Black Axe - GreenCharlie

Staff members of the U.S. Congress have been alerted to a phishing campaign in which unidentified individuals, impersonating government officials, are sending suspicious messages to lawmakers, urging them to download an encrypted messaging application.

The Administrative Office of the House of Representatives and the U.S. Marshals Service issued an urgent internal advisory to Congress members, warning of the potential threat. While the notification does not specify whether the perpetrators of the phishing attack are linked to the Salt Typhoon hacking group, officials strongly advise against opening unexpected messages or downloading unfamiliar applications.

This incident coincides with a significant intrusion by the Chinese hacking group Salt Typhoon into U.S. telecommunications networks. The attackers reportedly gained access to the systems of approximately 80 providers, including major companies such as AT&T, Verizon, and T-Mobile.

The Federal Communications Commission (FCC) has already initiated updates to telecommunications security standards. FCC Chairwoman Jessica Rosenworcel has called for the immediate strengthening of cybersecurity measures to counter unauthorized access.

Mark Green, Chair of the Congressional Homeland Security Committee, emphasized the need for a thorough investigation. He stressed the importance of comprehensively understanding the scope of the cyberattack and developing strategies to enhance the resilience of U.S. telecommunications networks.

Cybersecurity experts urge both citizens and government officials to exercise heightened vigilance. Recommendations include verifying the sources of messages, refraining from opening suspicious links, and relying solely on trusted communication channels.

The Cybersecurity Council has launched its own investigation into the activities of the Salt Typhoon group. U.S. law enforcement agencies are determined to meticulously analyze the hackers’ methods and prevent potential future attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *