The hacker figure out their agency into the connection of AT&T , Verizon , Lumen Technologies , and others , accord to anon.
source reference byTheWall Street Journal :
For month or longer , the cyber-terrorist might have hold entree to mesh base used to get together with legitimate U.S. petition for communication information , harmonise to mass intimate with the subject …
The aggressor also had memory access to other tranche of more generic cyberspace dealings , they articulate .
diving event into byTheWall Street Journal
The hacker work their manner into the web connection of AT&T , Verizon , Lumen Technologies , and others , fit in to anon.
source cite byTheWall Street Journal :
This was for calendar month or longer , the hacker might have contain approach to web substructure used to join forces with rule-governed u.s. request for communication information , grant to the great unwashed intimate with the subject …
The assailant also had admittance to other tranche of more generic cyberspace dealings , they enunciate .
The US DHSrecently saidthwarting Formosan hacker was a top security measures precedence .
[ WSJ ]