Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

China-Linked Hackers Breached FBI Wiretap System in Confirmed Major Incident

FBI seal overlaid on blue matrix-style code background representing the China-linked FBI surveillance system breach

A China-linked intrusion into an FBI surveillance system first reported in early March has been upgraded to a major incident under the Federal Information Security Modernization Act, with the bureau formally notifying Congress this week. The classification represents the highest cybersecurity alert level available under federal statute and signals that the breach poses demonstrable risk to national security.

The breach predates the Iran-linked Handala Hack compromise of FBI Director Kash Patel’s personal email account on March 27, underscoring that the bureau has faced intrusions from multiple nation-state actors within a matter of weeks.

The FBI first detected abnormal activity on February 17 and publicly acknowledged the investigation on March 6, confirming only that it had identified and addressed suspicious activities on its networks. The fuller picture emerged this week when sources confirmed the bureau’s formal FISMA major incident designation had been communicated to Congress, revealing the scope of the compromised data and confirming the breach was obtained through a third-party ISP.

The compromised system stored data from pen register and trap and trace surveillance operations, tools that capture metadata on who FBI investigation targets are communicating with rather than the content of those communications. Phone numbers of surveillance targets and personally identifiable information tied to subjects of FBI investigations were exposed.

How They Got In

According to the FBI’s notice to Congress, the attackers gained access by leveraging a commercial internet service provider’s vendor infrastructure, a method the bureau described as consistent with the group’s sophisticated tactics. No specific Chinese threat group has been formally named, though investigators have focused attention on Salt Typhoon, the Chinese Ministry of State Security-linked actor responsible for breaching all 3 major US cellular providers between 2019 and 2024 and previously accessing FBI wiretap infrastructure through telecommunications networks. The intrusion method is consistent with Salt Typhoon’s documented playbook of using commercial telecoms as a springboard into federal systems.

The breach was isolated to an unclassified system in the FBI’s Virgin Islands offices, not FBI headquarters. The FBI says it quickly leveraged technical capabilities to remediate the incident, though it remains unclear whether the interagency cyber response mechanism required under FISMA has been fully activated.

What the Exposure Means

The data exposed in this breach is particularly sensitive not because of its classification level but because of what it reveals operationally. Pen register and trap and trace data shows who the FBI is watching. Foreign intelligence services obtaining that information can identify active FBI investigation targets, tip them off, and potentially burn ongoing national security operations. The exposure of PII tied to subjects of FBI investigations compounds that risk.

House Homeland Security Committee Chairman Rep. Andrew Garbarino called the breach further evidence of China’s persistent targeting of US government systems through trusted third-party infrastructure, drawing a direct line to the Salt Typhoon telecommunications campaign. The White House, NSA, and CISA have all joined the investigation.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Share this:

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews