Cyber and Network Security - Latest News - Tech News

FBI Warns Salt Typhoon Now in 80 Countries

FBI Exposes China’s Salt Typhoon Hack Over 200 US Companies Breached

The FBI has revealed that a Chinese hacking group known as Salt Typhoon successfully compromised at least 200 companies in the United States. Consequently this large-scale cyberattack underscores the persistent threat posed by state-sponsored actors targeting US infrastructure and businesses.

Scope of Operations

  • The FBI and allied cybersecurity agencies identified Salt Typhoon a Chinese state-backed APT behind extensive cyber espionage campaigns. Consequently the group impacted over 80 countries breaching 600+ organizations globally including about 200 in the United States. Notably the campaign targeted U.S. telecom networks extracting metadata call records and even accessing law enforcement wiretap systems.

Targets and Techniques

  • Salt Typhoon has systematically compromised infrastructure across sectors telecommunications lodging transportation government entities and military systems by infiltrating backbone provider-edge and customer-edge routers.CISA
  • Its sophisticated methods include exploiting well-known vulnerabilities e.g. in Cisco Ivanti and Palo Alto devices deploying rootkits like Demodex for persistent access modifying router configurations and establishing covert tunnels e.g. GRE for data exfiltration.

High-Value Targets

  • Beyond telecoms Salt Typhoon also infiltrated sensitive U.S. systems. Specifically the group accessed defense contractors energy providers and government networks raising significant national security concerns.
    • Accessed call metadata and audio for prominent figures such as former President Trump and Vice President Vance.
    • Breached a National Guard network exposing administrator credentials geographic mapping data and personal information of service members.

International Advisory and Accountability

  • The FBI in collaboration with Five Eyes partners and multiple allied nations including Germany Italy Japan Czech Republic Finland the Netherlands Poland and Spain issued a joint cybersecurity advisory detailing the threat landscape and attribution to Chinese-linked companies.
  • Three Chinese companies Sichuan Juxinhe Network Technology Beijing Huanyu Tianqiong Information Technology and Sichuan Zhixin Ruijie Network Technology were specifically named accused of supplying cyber-intrusion tools and services to China’s Ministry of State Security and People’s Liberation Army. The U.S. Treasury has already sanctioned one of these entities.

Technical Guidance and Mitigation

Emphasis has been placed on threat hunting patching known router vulnerabilities strengthening network monitoring and detecting backdoor router configurations to prevent persistent access.

Agencies including the NSA and CISA released detailed advisories e.g. AA25-239A outlining the tactics indicators of compromise IOCs and recommended defense measures for network defenders especially those managing critical infrastructure.

Key Details of the Cyberattack

Security researchers are currently investigating the methods used by Salt Typhoon to infiltrate these networks. At the same time the FBI is working closely with affected organizations to mitigate the damage and enhance their security protocols. Ultimately the attack highlights the importance of proactive cybersecurity measures including.

  • Regular security audits and penetration testing
  • Implementing multi-factor authentication
  • Employee training on identifying phishing attempts
  • Upgrading and patching software vulnerabilities promptly

US Government’s Response

The US government is taking the Salt Typhoon incident seriously. Consequently officials are expected to increase diplomatic pressure on China to curb state-sponsored cyber activities. Meanwhile the Cybersecurity and Infrastructure Security Agency CISA is providing resources and guidance to help US businesses strengthen their defenses against similar attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *