Cyberattack: Hackers Stole ALL Americans' Data! What Now?
Sep 16, 2025
A massive cyberattack has potentially exposed the data of every American citizen. Cyber security expert Eric Cole breaks down the scope and severity, revealing the long-term risks and what you can do to protect yourself. #cybersecurity #hacking #dataBreach #privacy #securityTips
View Video Transcript
0:00
Hackers targeted political figures like
0:02
Donald Trump, JD Vance, and Kla Harris.
0:04
And officials now say it's likely that
0:07
every single American may have had their
0:09
information stolen. The foreign agents
0:11
were able to read encrypted text
0:13
messages, tap call records, and listen
0:16
in on audio recordings. Telecom
0:19
telecommunication giants like Verizon,
0:21
AT&T, and T-Mobile are just some of the
0:24
company's attacks. So, that gives you a
0:26
scope of what we're talking about here.
0:28
Joining us now to discuss the severity
0:30
of the cyber attack is CEO of Secure
0:32
anchor and former CIA hacker Eric Cole.
0:36
Boy, you've had a quite the career and
0:39
you're a great person to talk to about
0:40
this, Eric. You know, what's what do you
0:42
see as the significance of this attack
0:44
as it relates to national security? I
0:46
mean, I I think we're all concerned
0:48
about did they get our social security
0:50
numbers? Did they get personal
0:52
information? But what about national
0:53
security?
0:55
Yeah. To me, it's a wakeup call because
0:57
we knew for a while that the Chinese
0:59
were very, very advanced and launching
1:01
these attacks. Soul Typhoon has been
1:04
going on for six years and it's actually
1:06
not directly run by the government.
1:08
There's three Chinese corporations that
1:11
are funded by the government that are
1:12
launching these attacks. Imagine
1:15
companies with thousands of employees
1:17
where their only job seven days a week
1:19
is to target America, target our
1:21
information, and target our data. So
1:23
yes, this is very very concerning
1:25
especially when you look at getting
1:27
access to the president's cell phone,
1:29
the vice president's email and other
1:31
political information. This is very very
1:33
damaging and something that we need to
1:35
take seriously and start making cyber
1:37
security a top priority.
1:39
Okay. So you were a hacker with the CIA.
1:41
I mean I could talk to you for hours
1:42
about that. I'd like to learn more. Um
1:45
but you know how hard is it? How
1:46
difficult is it to pull something off
1:48
like this of this magnitude? We're
1:50
talking about nearly every American
1:52
possibly. Uh tell us about how they do
1:55
it.
1:56
The the scary part and I wish it wasn't
1:58
true. It's a lot easier than you
2:01
realize. It's a lot simpler to access
2:04
that information and data because just
2:06
think of how much information we're
2:08
storing online and giving away for free.
2:10
Most people when they're using social
2:12
media, their accounts are public. That
2:15
means everyone, including the Chinese,
2:18
North Korea, Russians, can gather and
2:20
get all of that information without even
2:22
having to hack. And then we're using old
2:24
passwords. A lot of our systems are
2:27
patched out of date. So the reality is
2:29
it's a lot simpler and easier for them
2:31
to get access to the information. The
2:33
bigger question is what are they going
2:35
to do with all this information? Because
2:37
imagine data on every single America
2:40
American. That's a lot of information,
2:42
right? That's a lot of data. So the
2:44
bigger concern is what is the longer
2:46
term inference attack that they're
2:48
trying to do by gathering all of that
2:50
data,
2:50
right? And then when we talk about every
2:52
American, I mean, you got to wonder what
2:54
they're looking for, you know, Joe in
2:55
Oklahoma, I mean, what are they looking
2:57
for uh when you're going down to, you
3:00
know, just the average person uh posting
3:02
pictures about their their kids and the
3:04
soccer games?
3:06
The the big thing there is really on
3:08
financial fraud because if I if I can
3:10
get his information essentially to open
3:13
up a credit card you need social
3:16
security number you need address. You
3:18
need phone number and a lot of these you
3:20
can open up like you've probably gone to
3:22
retail stores and you're checking out
3:23
and they're like oh we'll give you 10%
3:25
discount if you'd open up a credit card
3:28
very easy very quick and usually if you
3:30
stay under $3,000 it doesn't get
3:33
detected right away. So, not only the
3:35
Chinese trying to steal information, but
3:37
they're financially driven. So, the
3:39
average person's social security number
3:40
so they can open up accounts, drive up
3:43
credit, and do financial fraud is one of
3:45
the primary drivers.
3:47
Wow, that is really scary. Uh, you know,
3:49
Russian and North Korean actors have
3:51
also have this long history of
3:53
committing cyber crimes against the US,
3:55
right? When we go back and look at
3:56
history and leaders from all three
3:58
countries met this week for China's
4:00
military parade in Beijing with Trump
4:02
posting on True Social, quote, "May
4:04
President Xi and the wonderful people of
4:06
China have a great and lasting day of
4:09
celebration. Please give my warmest
4:11
regards to Vladimir Putin and Kim
4:13
Jong-un as you conspire against the
4:15
United States of America." All right, so
4:17
we've got that. Uh, you know, what do
4:19
you think? Is is US intelligence able to
4:21
compete with these forces? So, what do
4:23
you make of uh Trump's post there?
4:26
Yeah, he he is spot on. The only thing I
4:28
would have added to his post was he
4:30
should have said conspire against
4:31
America in cyerspace because because
4:33
that's really what they're talking
4:34
about. I mean, th this is terrifying.
4:37
The two most dominant players when it
4:39
comes to hacking and attacks against the
4:41
US are Russia and China. They're
4:44
advanced. They're sophisticated. They
4:46
have significant money. And the fact
4:48
that they're talking and teaming up is
4:51
hard because yes, we have great uh
4:53
military and intelligence folks and
4:55
people defending our nation. But when
4:56
you're taking the two top tier entities
4:59
in cyber attacks and combining them
5:01
against America, it's not really a fair
5:03
battle.
5:04
All right. If you could give me like a
5:05
10-second answer for the average person,
5:07
what should we do? Do we need to change
5:09
our passwords all the time?
5:12
Uh, so don't use passwords. Use
5:13
two-factor authentication,
5:15
okay?
5:15
Don't click on links and make all your
5:17
social media profiles private, not
5:19
public.
5:20
All right, we'll take that in mind.
5:22
Cyber security expert Eric Cole, thank
5:24
you very much for joining us on this
5:26
really important topic. Thank you. We'll
5:27
check back in with you. And Crime Con
5:29
2025 is in full swing.
#Computers & Electronics
#Politics
#Technology News

