Donald Trump and JD Vance

Chinese Hackers Target Trump and Vance’s Phone Data

A Chinese state-linked hacker group has allegedly targeted the phone communications of former President Donald Trump and vice presidential nominee JD Vance in a broad espionage campaign focused on high-profile U.S. targets, according to sources familiar with the matter. Additionally, hackers reportedly targeted individuals linked to the Harris-Walz campaign and senior officials within the Biden administration.

Scope of the Targeted Hackings

U.S. officials informed Trump’s campaign team that both Trump and Vance were among the individuals whose phone data was targeted by the Chinese hackers. Following the notification, Trump campaign spokesperson Steven Cheung criticized the Harris campaign, alleging that it had “emboldened China” with its policies, though no concrete evidence of a direct cause-and-effect relationship has been provided.

It remains unclear whether the hackers accessed any sensitive data. However, foreign actors often highly value phone communications of current and former senior U.S. officials due to the potential for sensitive national security information.

FBI and CISA Response to the Cyber Intrusions

In response to the targeted attacks, the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a joint statement: “The U.S. Government is investigating the unauthorized access to commercial telecommunications infrastructure by actors affiliated with the People’s Republic of China.” According to the agencies, the FBI quickly identified the telecommunications breaches, notified affected companies, provided technical assistance, and shared critical information with other potential victims.

The New York Times first reported on the breach involving Trump and Vance’s phones. Investigations indicate that this incident is part of a larger Chinese hacking campaign targeting several major U.S. telecommunications providers in recent months, likely with the goal of collecting sensitive national security data.

Chinese Hackers’ Skill and Persistence Raise Alarm

The cyber-espionage group, known in the cybersecurity world as Salt Typhoon, has drawn attention for its sophisticated hacking methods and tenacity in infiltrating computer networks. AT&T, Verizon, and Lumen are reportedly among the major telecommunications providers targeted by Salt Typhoon, with investigators observing the group’s effective burrowing capabilities within computer systems.

The sources assert that this incident does not appear to relate to any Justice Department wiretap requests or other U.S. law enforcement activities involving Trump or Vance. However, Salt Typhoon’s skill and persistence suggest an expansive effort to gain long-term access to sensitive data, prompting intense scrutiny by U.S. intelligence and security agencies.

Government and Congressional Oversight of the Breach

In response to the escalating threat, members of the House and Senate intelligence committees have been briefed on the hacking campaign. Senator Mark Warner, who chairs the Senate Intelligence Committee, labeled the breach as “a very serious” issue and confirmed that the committee is monitoring developments closely.

The House Homeland Security Committee is also investigating the intrusions. Committee Chair Rep. Mark Green expressed his concern about the depth and breadth of the breach, calling it a “very concerning cyber breach” that spans multiple layers of U.S. infrastructure.

Broader Context: Ongoing Influence Campaigns

This cybersecurity breach unfolds as China, alongside Iran and Russia, continues attempting to monitor or sway aspects of U.S. politics. While China has not mounted a direct effort to influence the presidential election, intelligence reports indicate it has orchestrated covert social media campaigns targeting at least ten congressional, state, or local election races in the United States.

The Chinese government has formally denied allegations related to the recent hacking campaign. However, the breach underscores the persistent challenge of securing U.S. communications infrastructure and protecting sensitive data against a backdrop of rising cyber-espionage efforts by foreign adversaries.