Imagine discovering that the heart of your government’s operations has been silently compromised by foreign hackers. That’s exactly what happened in Downing Street, according to shocking reports that have sent ripples across the globe. But here’s where it gets even more alarming: this wasn’t just a one-off incident—it was part of a years-long, global cyber-espionage campaign orchestrated by Chinese state-linked hackers. And this is the part most people miss: the breach didn’t just target random devices; it allegedly gave China access to the phone data of millions, including the ability to eavesdrop on calls, read text messages, and track locations.
The story broke when U.S. officials sounded the alarm in 2024, revealing that hacking groups had infiltrated telecom companies worldwide. According to The Associated Press, the campaign spanned multiple countries, including the U.S. and its Five Eyes allies—Australia, Canada, and New Zealand. But what makes this particularly chilling is the scope of the intrusion. Anne Neuberger, a former U.S. deputy national security adviser, explained that the hackers had ‘broad and full access’ to networks, enabling them to ‘geolocate millions of individuals and record phone calls at will.’
But here’s the controversial part: While U.S. intelligence believes the breaches began as early as 2021, they were only publicly disclosed in 2024. Why the delay? And what does this mean for national security? These questions have sparked intense debates, with some arguing that the delay left governments and citizens vulnerable for far too long.
In the U.K., the breach reportedly reached the very core of Downing Street, raising concerns that senior government officials may have been exposed. The Telegraph revealed that there were ‘many’ hacking attempts on the phones of Downing Street staff, particularly during Rishi Sunak’s tenure as Prime Minister from 2022 to 2024. One source described the breach as going ‘right into the heart of Downing Street,’ a statement that underscores the gravity of the situation.
To combat this threat, U.S. federal authorities urged telecom companies to strengthen their network security in 2024, with the FBI and Cybersecurity and Infrastructure Security Agency issuing guidance. A joint cybersecurity advisory followed in August 2025, warning that Chinese state-sponsored actors were targeting networks globally. The NSA highlighted that these activities overlapped with reports on threat actors like Salt Typhoon, a notorious name in the cyber-espionage world.
Yuval Wollman, a former Israeli intelligence chief, emphasized Salt Typhoon’s reach, noting that while much attention has been on U.S. targets, the group has also operated in Europe, the Middle East, and Africa, targeting telecom firms, governments, and tech companies. China’s foreign ministry, however, has dismissed these claims as ‘baseless’ and ‘lacking evidence,’ adding another layer of complexity to this already contentious issue.
Here’s the question that lingers: If even the most secure government institutions can fall victim to such sophisticated attacks, how safe are our personal devices and data? And what measures should governments and individuals take to protect themselves in this increasingly digital—and dangerous—landscape? Let’s discuss in the comments—do you think enough is being done to counter these threats, or are we still playing catch-up?