Salt Typhoon attack on US congressional email system ‘exposes how vulnerable core communications systems remain to nation-state actors’
The Salt Typhoon campaign marks the latest in a string of attacks on US government communications networks
Chinese state-backed threat group Salt Typhoon is believed to have gained access to email systems used by US Congressional Committee staff.
According to reports from the Financial Times, the threat group is thought to have compromised accounts belonging to staff working on the House China Committee.
Aides working at the Foreign Affairs Committee, Armed Services Committee, and Intelligence Committee are also believed to have been impacted by the attacks.
Sources told the FT the incident was first discovered in December.
Exact details on the scope of the incident are yet to be confirmed. A person familiar with the matter told the publication it remains unclear whether the group fully accessed email communications.
Salt Typhoon has cyber agencies on alert
The campaign marks the latest in a string of attacks by Salt Typhoon on US government email systems and telecommunications networks.
A previous attack saw the threat group access and record telephone conversations of “very senior” American political figures, according to Anne Neuberger, deputy national security advisor for cyber and emerging technology under the Biden administration.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
This particular campaign saw the group compromise major US telecoms companies, including Verizon, Lumen Technologies, and AT&T.
Salt Typhoon activities have escalated over the last three years, with security agencies on both sides of the Atlantic issuing repeated warnings about the threat posed by the group.
An advisory from the FBI in September noted the group had hit organizations in more than 80 countries as part of an “indiscriminate” hacking campaign.
In mid-2025, it was revealed the threat group also compromised US state National Guard networks. An investigation by the US Department of Defense (DoD) found hackers breached and laid low in compromised networks for almost a year.
The DoD warned the group may have accessed sensitive information pertaining to military and law enforcement operations.
“Deeply concerning” attacks
Benjamin Schilz, CEO at Wire, said the latest campaign “exposes how vulnerable core communications systems remain to nation-state actors”
“The Salt Typhoon espionage campaign highlights a sustained, state-backed assault on U.S. communications infrastructure by China’s Ministry of State Security,” he said.
“Regardless of whether lawmakers’ emails were accessed, the fact this activity went undetected for years is deeply concerning.
“Persistent access of this nature creates the potential to intercept unencrypted communications, including calls, messages, and voicemails across the U.S. population, posing a serious national security risk,” Schilz added.
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Retailers ramp up automation to tackle supply chain challengesNews Companies are moving AI projects from pilot to production across the board, with a focus on open-source models and software, as well as agentic and physical AI
-
Hacked London council warns hundreds of thousands of residents at risk of follow-up scamsNews The council is warning residents they may be at increased risk of phishing scams in the wake of the cyber attack.
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countriesNews The Salt Typhoon hacker group has waged several major campaigns against US telecoms companies and critical infrastructure operators – now it's ramping up attacks globally.
-
‘All US forces must now assume their networks are compromised’ after Salt Typhoon breachNews The announcement marks the second major Salt Typhoon incident in the space of two years
-
UK cyber experts on red alert after Salt Typhoon attacks on US telcosAnalysis The UK could be next in a spate of state-sponsored attacks on telecoms infrastructure
-
Healthcare data breaches are out of control – here's how the US plans to beef up security standardsNews Changes to HIPAA security rules will require organizations to implement MFA, network segmentation, and more
-
The US could be set to ban TP-Link routersNews US authorities could be lining up the largest equipment proscription since the 2019 ban on Huawei networking infrastructure
-
US government IT contractor could face death penalty over espionage chargesNews The IT pro faces two espionage charges, each of which could lead to a death sentence or life imprisonment, prosecutors said
-
US identifies and places $10 million bounty on LockBit, Hive ransomware kingpinNews Mikhail Pavlovich Matveev was linked to specific ransomware attacks, including a 2021 raid on the DC police department