-
How to Watch Guadalajara vs Atlas: Live Stream Liga MX, TV Channel - 14 mins ago
-
California voters approve measure aimed at restricting AIDS Healthcare Foundation spending - 21 mins ago
-
How Hostility to Immigrants Will Hurt America’s Tech Sector - 31 mins ago
-
Red Sox Predicted To Sign $156M Gold Glover, Lucas Giolito’s High School Teammate - 49 mins ago
-
California barber charged with sexually assaulting intoxicated men - about 1 hour ago
-
U.N. Watchdog Censures Iran Over Nuclear Program Secrecy - about 1 hour ago
-
Juan Soto Seeking More Than Money in Free Agent Discussions: Report - about 1 hour ago
-
Cartel leader’s son-in-law faked death to live in California, feds say - 2 hours ago
-
Why Country Fans Are Furious Over The CMAs Toby Keith Tribute - 2 hours ago
-
Man Who Faked Kayaking Death Says in Video He’s ‘Safe’ - 2 hours ago
Hackers May Have Accessed Trove of Intel on Trump and Vance Phones
Chinese hackers tried to gain access to data on the phones of former President Donald Trump and running mate JD Vance, as well as those belonging to people associated with the campaign of Vice President Kamala Harris, The New York Times and Wall Street Journal reported on Friday.
Cybersecurity experts say if the hackers were successful, the potential repercussions could be massive.
According to the Times, Trump and his associates were told this week that Chinese hackers had targeted their phone numbers after infiltrating Verizon’s telecommunications infrastructure.
“It’s an incredibly big deal,” said Chris Pierson, CEO of BlackCloak and a former cybersecurity adviser to the Department of Homeland Security. “If this is a nation state that has compromised a phone carrier and is trying to ascertain information about the campaigns, about the candidates and their inner circle, that’s of the highest level importance.”
Investigators are still trying to gauge the extent of the hack and how much data may have been compromised, the Times reported.
Hackers can gain access to a trove of valuable information by targeting someone’s phone data. That’s doubly true in the case of high-level government officials and political candidates.
Most phone applications that candidates use tend to be encrypted, but hackers can still access a phone’s metadata through the kind of breach described in the Times‘ reporting.
Intruders Can Build a ‘Pattern of Life’
Metadata “includes who the person is talking to, how long they’ve been talking to someone, what the location of those phones is—so intruders can build a pattern of life,” Carlos Perez, incident response practice lead at TrustedSec, told Newsweek.
“Where do they go, at what hour, and are they following a predictable schedule?” he added.
Developing that “pattern of life,” then, also makes it easier for bad actors to conduct further surveillance by planting listening devices or recording devices at places they know the target frequents, and scoping out specific locations to search for documents or electronic data they’d consider valuable.
“It could give individuals access to location information, which poses a security risk,” Pierson said.
This kind of targeted attack also presents risks to people associated with the main target, like family members and staffers.
If a hacker knows that the target of their intelligence-gathering operation is “always talking with a specific reporter, or knows that you’re using a particular staffer to do it, then more than likely that staffer, or sometimes third-party individual, can be a target,” Perez said.
There’s a “lot more that needs to be discovered here,” Pierson said, “but it appears like this is being attributed to China,” and the information the hackers could glean from the breach would be “enormously useful” to them.
Source link