"theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to US law enforcement requests pursuant to court orders."
This is a step up from the two agencies' late October admission that they were on the case and actively providing assistance to affected companies and potential victims.
The announcement gets close to verifying almost everything that has been previously reported about the incident: That, after breaking into telcos' networks, the entities – which have sometimes been labelled "Salt Typhoon" – compromised the wiretapping systems used for court-ordered surveillance; and that the snoops also targeted phones belonging to people affiliated with US Democratic presidential candidate Kamala Harris, along with Republican president-elect Donald Trump and VP-elect JD Vance.
It comes over a month after reports emerged that indicated a Chinese government-backed spy crew had breached US telecommunications networks Verizon, AT&T, and Lumen Technologies.
https://www.theregister.com/2024/09/25/chinas_salt_typhoon_cyber_spies/
Earlier this week, security researchers warned that a different Chinese government-backed spy crew – Volt Typhoon – is once again compromising old Cisco routers to build a botnet to break into critical infrastructure networks and kick off cyber attacks
https://www.theregister.com/2024/11/13/china_volt_typhoon_back/