Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Increasingly Sophisticated Cyber Threat Landscape: Salt Typhoon's Breach of U.S. Telecommunications Providers



The Chinese hacking group Salt Typhoon has breached multiple U.S. telecommunications companies by exploiting vulnerabilities in Cisco IOS XE network devices, highlighting the ongoing efforts by hackers to compromise critical infrastructure and disrupt global supply chains.


  • Chinese hacking group Salt Typhoon breached multiple U.S. telecommunications companies by exploiting vulnerabilities in Cisco IOS XE network devices.
  • The breach was accomplished by exploiting two zero-day vulnerabilities, CVE-2023-20198 and CVE-2023-20273, which were discovered by Cisco in October 2023.
  • The attack resulted in significant disruption to telecommunications providers across various regions, including the U.S., Italy, the U.K., South Africa, and Thailand.
  • The breach highlights the ongoing efforts by Chinese hackers to compromise critical infrastructure and disrupt global supply chains.
  • Experts advise administrators to patch Cisco IOS XE devices promptly and limit exposure of admin interfaces and non-essential services to the internet.



  • The global cybersecurity landscape has witnessed a significant escalation in recent times, with highly sophisticated and targeted attacks being launched against various sectors, including telecommunications providers. The latest breach to grab attention is that of China-linked APT group Salt Typhoon, which has successfully compromised multiple U.S. telecommunications companies by exploiting vulnerabilities in Cisco IOS XE network devices.



    According to a report published by Recorded Future’s Insikt Group, the Chinese hacking group Salt Typhoon has been actively targeting telecommunications providers worldwide for over two years, with its primary objective being to gain access to sensitive information and disrupt critical infrastructure. The group's tactics, techniques, and procedures (TTPs) have evolved significantly over time, making them increasingly difficult to detect and mitigate.



    The breach in question was accomplished by exploiting two zero-day vulnerabilities in Cisco IOS XE network devices, specifically CVE-2023-20198 and CVE-2023-20273. The former vulnerability allows an attacker to gain administrator privileges on the device, while the latter vulnerability enables a remote, unauthenticated attacker to create an account on the device with privilege level 15 access.



    The vulnerabilities were discovered by Cisco in October 2023 and were subsequently patched. However, it appears that Salt Typhoon's attack was launched before the patches became available, allowing the group to exploit the vulnerabilities without being detected.



    The breach has resulted in significant disruption to multiple telecommunications providers across various regions, including the U.S., Italy, the U.K., South Africa, and Thailand. According to Insikt Group researchers, over 12,000 Cisco network devices with their web UIs exposed to the internet were targeted by Salt Typhoon.



    The attack was conducted using generic routing encapsulation (GRE) tunnels on compromised Cisco devices, which allowed RedMike, a threat actor believed to be affiliated with Salt Typhoon, to maintain persistence, evade detection, and exfiltrate data stealthily. The data exfiltrated from the compromised devices includes sensitive information such as network topology, security configurations, and customer data.



    The breach highlights the ongoing efforts by Chinese hackers to compromise critical infrastructure and disrupt global supply chains. Salt Typhoon's success in breaching multiple U.S. telecommunications providers underscores the sophistication and persistence of these attacks.



    In response to the breach, experts have advised administrators to patch Cisco IOS XE devices promptly and limit the exposure of admin interfaces and non-essential services to the internet. The breach serves as a wake-up call for organizations to prioritize their cybersecurity posture and implement robust security measures to prevent similar breaches in the future.



    Furthermore, the breach has sparked renewed concerns about the vulnerability of critical infrastructure to cyber threats. As the global economy continues to rely on complex networks and systems, the risk of compromise by malicious actors will only continue to escalate unless proactive measures are taken to address this threat.




    The Chinese hacking group Salt Typhoon has breached multiple U.S. telecommunications companies by exploiting vulnerabilities in Cisco IOS XE network devices, highlighting the ongoing efforts by hackers to compromise critical infrastructure and disrupt global supply chains.


    According to a recent report by The Wall Street Journal, China-linked cyberespionage group Salt Typhoon targeted more US telecoms than previously known, with at least eight U.S. telecommunications firms compromised in the attack. The group exploited vulnerabilities in network devices from security major vendors, including Cisco and Fortinet.



    The breach has been attributed to China-linked APT group Salt Typhoon, also known as FamousSparrow and GhostEmperor, which has been active since at least 2019 and targeted government entities and telecom companies. The group's tools have been employed in recent attacks, including the RA World Ransomware attack.



    Experts have warned that the breach highlights the ongoing threat of cyber espionage by China-linked APT groups. The incident serves as a reminder to organizations to prioritize their cybersecurity posture and implement robust security measures to prevent similar breaches in the future.



    In related news, Valve has removed the game PirateFi from the Steam video game platform due to its inclusion of malware. Experts have warned that such games can serve as a vector for malware distribution, highlighting the ongoing threat of cyber attacks in the gaming industry.



    Furthermore, experts have discovered a PostgreSQL flaw chained with BeyondTrust zero-day in targeted attacks. The attack highlights the ongoing efforts by hackers to exploit vulnerabilities in software and applications.



    The breach of U.S. telecommunications providers by Salt Typhoon serves as a reminder of the ongoing threat of cyber espionage by China-linked APT groups. As the global economy continues to rely on complex networks and systems, the risk of compromise by malicious actors will only continue to escalate unless proactive measures are taken to address this threat.



    The incident highlights the importance of prioritizing cybersecurity posture and implementing robust security measures to prevent similar breaches in the future. Organizations must take proactive steps to protect their networks and systems from cyber threats, including regular software updates, network segmentation, and employee education.



    In conclusion, the breach of U.S. telecommunications providers by Salt Typhoon serves as a reminder of the ongoing threat of cyber espionage by China-linked APT groups. As the global economy continues to rely on complex networks and systems, the risk of compromise by malicious actors will only continue to escalate unless proactive measures are taken to address this threat.





    Related Information:

  • https://securityaffairs.com/174226/apt/salt-typhoon-exploited-cisco-ios-xe-flaws.html

  • https://nvd.nist.gov/vuln/detail/CVE-2023-20198

  • https://www.cvedetails.com/cve/CVE-2023-20198/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-20273

  • https://www.cvedetails.com/cve/CVE-2023-20273/


  • Published: Fri Feb 14 15:12:30 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us