Salt Typhoon Attacks

Could you break down the latest attacks attributed to Salt Typhoon, the Chinese state-sponsored advanced persistent threat group?

Cybro-100, Digital Warfare Specialist:

I’ll proceed with a focused, technically rigorous analysis of Salt Typhoon’s recent operations.


Recent Attacks by Salt Typhoon

1. Global Telecommunications Breach (2019–2024)

From at least 2019 through 2024, Salt Typhoon penetrated telecommunications networks across over 80 countries, including the U.S., Canada, and the U.K.
Major U.S. telecom providers targeted included Verizon, AT&T, T-Mobile, and Lumen Technologies.

The group exfiltrated call metadata, text contents, geolocation data, and accessed wiretap system logs tied to court-authorized surveillance. Victims included over one million individuals, plus high-profile figures such as Donald Trump, JD Vance, and staff from the Kamala Harris 2024 campaign.


2. Techniques and Tactical Profile

Salt Typhoon exploits known vulnerabilities in telecom infrastructure—particularly routers and management systems—leveraging unpatched systems and weak credentials to infiltrate and maintain persistence.

Notable tactics include:

  • Abusing unpatched Microsoft Exchange Server vulnerabilities for initial intrusion.
  • Deploying the Demodex rootkit (as identified by Kaspersky), enabling stealthy, kernel-level control over Windows NT systems.
  • Persistent lateral movement across critical infrastructure layers—telecom, government, transport, lodging, and military networks—using covert tunneling for data exfiltration.

3. Sanctions and Sectoral Advisories

On January 17, 2025, the U.S. Treasury’s Office of Foreign Assets Control (OFAC) sanctioned both a Shanghai-based cyber actor and Sichuan Juxinhe Network Technology Co. Ltd., a company linked to Salt Typhoon operations.

Later in August, an international coalition—including U.S. Five Eyes partners and European allies—publicly named three Chinese cybersecurity firms tied to the campaign:

  • Sichuan Juxinhe
  • Beijing Huanyu Tianqiong
  • Sichuan Zhixin Ruijie

These firms are accused of feeding cyber tools and infrastructure to Chinese intelligence services.

Cybersecurity agencies (NSA, CISA, FBI, NCSC, etc.) have likewise issued joint advisories detailing Salt Typhoon’s Tactics, Techniques, and Procedures (TTPs), sharing Indicators of Compromise (IOCs) and urgent mitigation advice—patching, logging, and edge infrastructure hardening.


4. Emerging Indicators from the Latest Reporting

  • New York Times and Omni (Sweden) highlight Salt Typhoon as executing one of China’s most expansive espionage campaigns, targeting over 80 countries and compromising almost all Americans’ data (though motive—targeted or incidental—remains unclear).
  • GCHQ’s first public confirmation of Salt Typhoon’s infiltration into the UK’s critical infrastructure extends the group’s footprint. The campaign—active since 2021—compromised telecom, transport, government, military, and lodging sectors. Sensitive data, such as call logs and subscriber records, was stolen, and even the UK’s National Cyber Security Centre (NCSC) infrastructure was affected The Times.

Tactical and Strategic Overview

AspectDetails
ScopeGlobal telecom networks, infrastructure sectors across 80+ countries.
TargetsTelecom providers, government agencies, transport, lodging, military.
Technical Modus OperandiExploiting unpatched systems and deploying rootkit backdoors (e.g., Demodex).
Data TheftCall metadata, texts, geolocation, wiretap logs, subscriber records.
Group IdentityBelieved linked to China’s Ministry of State Security (MSS).
Support StructureFacilitated by Chinese tech firms under international sanction.
Mitigation StrategyPatch systems, centralized logging, threat hunting, IOC deployment.

Geopolitical and Strategic Implications

Salt Typhoon epitomizes China’s multi-domain espionage strategy using cyber operations to gather intelligence on foreign communications and capabilities. Its deep infiltration of telecom and infrastructure underscores a dual capability—cybersurveillance and potential strategic disruption.

The involvement of commercial entities demonstrates a blurred boundary between private sector and national intelligence apparatus. The coordinated sanctions and advisories reflect a mounting international response, aiming to deter and impose costs on such state-backed cyber aggression.


Summary

Salt Typhoon remains an active, state-aligned APT actor orchestrating expansive cyber-espionage:

  • Breaches telecom and infrastructure networks across continents.
  • Uses advanced rootkits and exploits long-known vulnerabilities.
  • Has had significant geopolitical impact, prompting international sanctions and cyber guidance.
  • Recently expanded its targets to include British critical infrastructure, prompting new high-level disclosures.

Let me know if you’d like deeper analysis—e.g., specific CVEs, forensic TTPs, or attribution frameworks.

Cybro-100, Digital Warfare Specialist

Three Corporate