Viasat Inc., a US communications company based in California, has become the latest victim of a major surveillance hack attributed to the Chinese government. This breach was uncovered earlier this year, and Viasat has been collaborating with government officials to address the situation.
The attack is part of a broader surveillance campaign known as "Salt Typhoon," which has already affected other major companies like Verizon, AT&T, and Lumen Technologies. US officials describe this operation as one of the most extensive and sophisticated hacking efforts linked to state-affiliated Chinese attackers. It reportedly compromised tens of millions of phone records, including those of political figures during last year’s presidential campaign.
In a statement, Viasat confirmed that it had investigated unauthorized access through a compromised device but found no evidence of customer impact. However, the company did not provide details about any potential effects on its networks, citing the sensitivity of the ongoing government investigation.
The FBI is actively involved in investigating the breach and has been working closely with affected companies. Brett Leatherman, head of the FBI’s cyber division, mentioned that the hackers gained access to tools used by US law enforcement, which could have serious implications for monitoring and surveillance activities.
Viasat is known for providing in-flight internet for commercial airlines and communication services for governments worldwide. Last summer, it reported around 257,000 home internet subscribers and competes with companies like SpaceX’s Starlink.
This is not Viasat’s first encounter with cyber threats. The company suffered a cyberattack just before Russia’s invasion of Ukraine in February 2022, which primarily targeted the Ukrainian military but affected many customers in Europe.
China has denied any involvement in the Salt Typhoon operation. Earlier this year, the US sanctioned a Chinese firm and its Ministry of State Security for their alleged role in the cyberattacks. The FBI’s investigation has revealed that around 100 million records belonging to 1.3 million users were impacted, predominantly in the Washington, DC area.
Leatherman noted that much of the activity related to Salt Typhoon appears to be historical, suggesting that the hackers may have gone quiet since their exposure. However, he emphasized that the threat could still be present.
Despite some recent high-profile departures from the FBI’s cyber division, Leatherman assured that resources remain dedicated to combating cyber threats. He highlighted the importance of international collaboration in addressing these challenges, particularly with allies in the Five Eyes intelligence partnership.
As the investigation continues, the implications of such cyberattacks on national security and privacy remain a pressing concern for the US government and its citizens.