China's Salt Typhoon Hackers: Still Breaching Telecom Firms Despite US Sanctions

The world of cybersecurity is a constant game of cat and mouse, with hackers continually evolving their tactics to breach even the most fortified systems. One persistent and particularly concerning player in this arena is Salt Typhoon, a Chinese government-linked hacking group. Despite recent sanctions imposed by the U.S. government, this group remains active and is continuing to compromise telecommunications providers across the globe, raising serious questions about the efficacy of current deterrents and the escalating threat to national security.


A recent report shared with TechCrunch by threat intelligence firm Recorded Future paints a worrying picture of Salt Typhoon's ongoing activities. The report details how the group successfully breached five telecommunications firms between December 2024 and January 2025, demonstrating their resilience and determination even in the face of international pressure.

Salt Typhoon first gained notoriety last September when their infiltration of major U.S. phone and internet giants, including AT&T and Verizon, was revealed. This breach allowed them access to the private communications of senior U.S. government officials and political figures, a significant security lapse with potentially far-reaching consequences. Even more alarming was their access to systems used by law enforcement agencies for court-authorized data collection. This intrusion potentially exposed sensitive information, including the identities of Chinese targets of U.S. surveillance, severely compromising intelligence operations and potentially endangering individuals.

Recorded Future, while refraining from naming the specific victims of these latest attacks, disclosed that they include a U.S.-based affiliate of a prominent U.K. telecommunications provider, a U.S. internet service provider, and telecommunications companies in Italy, South Africa, and Thailand. This geographically diverse targeting underscores the global reach of Salt Typhoon's operations and the indiscriminate nature of their attacks. Furthermore, the group was observed performing reconnaissance on infrastructure assets belonging to Myanmar-based telecommunications provider, Mytel, suggesting potential future attacks in that region.

Exploiting Vulnerabilities: A Familiar Tactic

Salt Typhoon's methods are not particularly sophisticated, but they are effective. The group primarily exploits known vulnerabilities in commonly used software and hardware. In these recent attacks, they leveraged two specific vulnerabilities, CVE-2023-20198 and CVE-2023-20273, to compromise unpatched Cisco devices running Cisco IOS XE software. This highlights a persistent problem in the cybersecurity world: the failure to patch known vulnerabilities. Despite alerts and available fixes, many organizations lag in implementing updates, leaving their systems exposed to attacks. Recorded Future's report indicates that Salt Typhoon attempted to compromise over 1,000 Cisco devices globally, with a particular focus on those within telecommunications providers' networks. This targeted approach demonstrates a clear understanding of the critical role these devices play in network infrastructure and the potential damage that can be inflicted by compromising them.

Beyond Telecom: Targeting Universities

Salt Typhoon's targets extend beyond telecommunications companies. Recorded Future also observed the group targeting devices associated with universities, including the University of California and Utah Tech. While the exact motives behind these attacks remain unclear, researchers speculate that the group may be seeking access to research in areas related to telecommunications, engineering, and technology. Universities often house cutting-edge research and development, making them attractive targets for state-sponsored actors seeking to gain a competitive edge. This targeting of academic institutions underscores the broad scope of Salt Typhoon's activities and the potential for intellectual property theft and the compromise of sensitive research data.

Sanctions: A Toothless Tiger?

In January, the U.S. Treasury Department, itself a target of Chinese government hackers recently, announced sanctions against a China-based cybersecurity company, Sichuan Juxinhe Network Technology, for its direct links to Salt Typhoon. This action was intended to deter the group's activities and send a message that such cyberattacks would not be tolerated. However, Recorded Future's findings suggest that these sanctions have had little to no impact on Salt Typhoon's operations. The group continues to target telecommunications providers, demonstrating a remarkable ability to adapt and circumvent these measures. This raises serious questions about the effectiveness of current sanction regimes in deterring state-sponsored cyberattacks. It suggests that more robust and coordinated international efforts are needed to hold perpetrators accountable and disrupt their operations.

The Future of Cyber Warfare: A Looming Threat

Recorded Future's researchers predict that Salt Typhoon will continue to target telecommunications providers in the U.S. and elsewhere. This persistent threat underscores the ongoing challenge of securing critical infrastructure against state-sponsored cyberattacks. The telecommunications sector, in particular, remains a prime target due to its central role in modern society and the vast amounts of sensitive data it handles. The potential consequences of a successful attack on a major telecommunications provider are significant, ranging from disruptions in communication services to the compromise of personal data and national security information.

The Salt Typhoon case highlights several key issues in the ongoing struggle against cybercrime and state-sponsored hacking:

  • The persistent threat of known vulnerabilities: The continued exploitation of unpatched vulnerabilities underscores the need for organizations to prioritize security updates and implement robust patch management processes.
  • The limitations of sanctions: Current sanction regimes appear to have limited impact on deterring state-sponsored hacking groups, necessitating the development of more effective international cooperation and enforcement mechanisms.
  • The evolving nature of cyber warfare: State-sponsored actors are constantly evolving their tactics and techniques, requiring a proactive and adaptive approach to cybersecurity.
  • The need for information sharing: Effective cybersecurity relies on the timely sharing of threat intelligence and best practices across industries and nations.

A Call to Action:

The ongoing activities of Salt Typhoon serve as a stark reminder of the ever-present threat of cyberattacks. Governments, businesses, and individuals must take proactive steps to strengthen their cybersecurity defenses and protect themselves from these malicious actors. This includes:

  • Prioritizing security updates: Implementing timely patches and updates for all software and hardware is crucial to mitigating known vulnerabilities.
  • Investing in cybersecurity infrastructure: Organizations must invest in robust security solutions, including firewalls, intrusion detection systems, and threat intelligence platforms.
  • Training employees: Regular cybersecurity training can help employees identify and avoid phishing scams and other social engineering tactics.
  • Developing incident response plans: Organizations should have well-defined incident response plans in place to effectively manage and mitigate cyberattacks.
  • Collaborating and sharing information: Sharing threat intelligence and best practices across industries and nations is essential to combating cybercrime.
  • The fight against cybercrime is an ongoing battle. By understanding the threats posed by groups like Salt Typhoon and taking proactive steps to strengthen our defenses, we can better protect ourselves and our critical infrastructure from these malicious actors. The stakes are high, and the time to act is now.

Post a Comment

Previous Post Next Post