Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Senator Demands AT&T, Verizon CEOs Testify Over Salt
Senator Demands AT&T, Verizon CEOs Testify Over Salt
NEWS

Senator Demands AT&T, Verizon CEOs Testify Over Salt

Senate Commerce Committee Chair Maria Cantwell accuses AT&T and Verizon of blocking Mandiant security reports related to the Salt Typhoon campaign,...

Dylan H.

News Desk

February 3, 2026
4 min read

Congressional Pressure Mounts

Senate Commerce Committee Chair Maria Cantwell (D-WA) has publicly accused AT&T and Verizon of deliberately blocking the release of Mandiant security assessment reports related to the Salt Typhoon Chinese state-sponsored cyber espionage campaign. In a sharply worded letter, Cantwell demanded that both telecom CEOs appear before the committee to testify under oath.

"The American people deserve to know how deeply their communications networks were compromised, and why these companies have stonewalled congressional oversight for months."

The senator called Salt Typhoon "one of the worst telecom hacks in U.S. history" and accused both carriers of prioritizing corporate reputation over national security transparency.


What Is Salt Typhoon?

Salt Typhoon is a Chinese state-sponsored advanced persistent threat (APT) group that conducted a sweeping espionage campaign targeting global telecommunications infrastructure. The FBI's assessment reveals the staggering scale of the operation:

MetricDetail
Countries targeted80+
Organizations notified600+
Primary targetsTelecom providers, ISPs, government communications
AttributionChinese Ministry of State Security (MSS)
Discovery timelineLate 2024 — ongoing through 2025
U.S. carriers compromisedAT&T, Verizon, T-Mobile, Lumen Technologies

What Was Accessed

According to federal investigators, Salt Typhoon operators gained access to:

  1. Call detail records (CDRs) — Metadata showing who called whom, when, and for how long
  2. Lawful intercept systems — Wiretap infrastructure used by law enforcement
  3. Senior government communications — Calls and texts of high-ranking officials
  4. Network routing data — Infrastructure topology of major U.S. carriers

Timeline of the Salt Typhoon Campaign

DateEvent
Mid-2024Salt Typhoon gains initial access to U.S. telecom networks
September 2024FBI and CISA begin investigating suspicious telecom activity
October 2024Initial public disclosure of Chinese telecom intrusions
December 2024White House confirms 9 U.S. telecom companies compromised
January 2025Mandiant engaged for independent security assessments
November 2025DOJ and FBI issue expanded scope findings — 80+ countries
January 2026Senator Cantwell requests Mandiant reports from AT&T and Verizon
February 2026Both carriers refuse to release reports; Cantwell demands CEO testimony

Congressional Action

The Transparency Dispute

At the center of this fight are Mandiant security assessment reports — detailed forensic analyses commissioned by AT&T and Verizon after the breach was discovered. Cantwell argues these reports should be shared with congressional oversight committees. Both carriers have claimed the reports are protected by attorney-client privilege and contain proprietary security information.

What Congress Is Demanding

  • CEO testimony — AT&T CEO John Stankey and Verizon CEO Hans Vestberg ordered to appear
  • Mandiant report release — Full disclosure of breach scope and remediation status
  • Remediation timeline — Detailed plans for securing compromised infrastructure
  • Legislative proposals — New mandatory breach disclosure requirements for telecom providers

Bipartisan Support

The demand for transparency has drawn bipartisan backing, with members from both sides of the aisle expressing alarm at the scale of Chinese penetration into U.S. communications infrastructure.


Why This Matters

Salt Typhoon represents a fundamental compromise of the infrastructure Americans rely on for private communications. The implications extend beyond the telecom sector:

  • National security — Foreign adversaries accessed systems designed for lawful surveillance
  • Public trust — Carriers' refusal to disclose findings erodes confidence in the telecom industry
  • Policy precedent — Congressional response will shape future breach disclosure requirements
  • Allied concerns — With 80+ countries affected, this is a global intelligence failure

For IT and security professionals, this case underscores the critical importance of network infrastructure security, supply chain transparency, and incident response accountability at the highest levels of corporate leadership.


Sources

  • U.S. Senate Commerce Committee — Cantwell Demands Telecom CEO Testimony
  • Nextgov/FCW — Senator Accuses AT&T, Verizon of Blocking Salt Typhoon Reports
  • CyberNews — Salt Typhoon: FBI Says 80+ Countries Targeted in Telecom Hack

Related Reading

  • China-Linked UNC3886 Breaches All Four Singapore Telecom
  • UNC3886 Zero-Day Campaign: Singapore Telecom Operators
  • Google: 90 Zero-Days Exploited in 2025 — Enterprise Tech
#Salt Typhoon#China#Telecom#AT&T#Verizon#Congress#Nation-State

Related Articles

China-Linked UNC3886 Breaches All Four Singapore Telecom

Singapore discloses that APT group UNC3886 compromised all four major telecom providers using zero-day exploits and rootkits, triggering the nation's...

3 min read

Google: 90 Zero-Days Exploited in 2025 — Enterprise Tech

Google's Threat Intelligence Group tracked 90 zero-day vulnerabilities actively exploited in 2025, with enterprise software and appliances accounting for...

8 min read

DarkSword GitHub Leak Threatens to Turn Elite iPhone Hacking Into a Tool for the Masses

Researchers say the GitHub leak of the DarkSword iOS exploit chain — six chained vulnerabilities targeting iOS 18.4 through 18.7 — threatens to...

5 min read
Back to all News