Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Salt Typhoon Hackers: Unmasking the Cyber-Spies Behind the Telecom Breaches



The FBI has issued a public service announcement seeking tips that could help identify and locate the Salt Typhoon hackers who targeted US telecommunications infrastructure. In response, the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has announced sanctions against Sichuan Juxinhe Network Technology, a Chinese cybersecurity firm believed to be directly involved in the Salt Typhoon telecom breaches. The FBI is urging individuals with any information regarding the individuals who comprise Salt Typhon or other Salt Typhon activity to come forward and provide it. This is a clear indication that the authorities are taking the situation seriously and are willing to engage with the public in an effort to gather more information about these cyber-attacks.

  • The Salt Typhoon hackers have breached numerous networks worldwide, including those of U.S. government agencies, major telecom providers, and foreign ISPs.
  • The attackers exploited a privilege escalation vulnerability in unpatched Cisco IOS XE network devices to gain access to compromised networks.
  • The hackers seem to have gained access to the U.S. law enforcement's wiretapping platform, allowing them to intercept private communications.
  • The FBI is seeking tips from the public to help identify and locate the Salt Typhoon hackers.
  • The U.S. Department of the Treasury has imposed sanctions on a Chinese cybersecurity firm believed to be involved in the Salt Typhoon breaches.
  • The FBI is offering a reward of up to $10 million for information about government-linked foreign hackers linked to malicious cyber activities against U.S. critical infrastructure.



  • The world of telecommunications has been hit hard by a sophisticated and relentless cyber-attack campaign, leaving multiple major telecom providers and governments scrambling to contain the damage. The Salt Typhoon hackers, believed to be linked to the Chinese state, have been accused of breaching numerous networks worldwide, including those of U.S. government agencies, companies such as AT&T, Verizon, Lumen, Charter Communications, Consolidated Communications, Windstream, a U.S.-based affiliate of a U.K. telecommunications provider, an Italian ISP, a South African telecom provider, and a large Thai telecommunications provider.

    According to sources close to the investigation, the Salt Typhoon hackers have been using various tactics to gain access to these networks, including exploiting privilege escalation vulnerabilities in unpatched Cisco IOS XE network devices. This particular vulnerability has proven particularly appealing to the hackers, who have managed to breach multiple networks by taking advantage of it.

    But what makes this attack campaign so unique is that it involves a level of sophistication and stealth that is all too common among state-sponsored hackers. The attackers seem to have gained access to the U.S. law enforcement's wiretapping platform, allowing them to intercept private communications involving identified victims. This has raised serious concerns about the security of sensitive information and the potential for espionage.

    The FBI has issued a public service announcement seeking tips that could help identify and locate the Salt Typhoon hackers who targeted US telecommunications infrastructure. The agency is particularly keen on hearing from individuals with any information regarding the individuals who comprise Salt Typhoon or other Salt Typhoon activity. This is a clear indication that the authorities are taking the situation seriously and are willing to engage with the public in an effort to gather more information.

    Furthermore, the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has announced sanctions against Sichuan Juxinhe Network Technology, a Chinese cybersecurity firm believed to be directly involved in the Salt Typhoon telecom breaches. This move suggests that the U.S. government is taking a hardline approach towards China and its alleged involvement in these cyber-attacks.

    In addition, the FBI has reminded the public that the U.S. Department of State is offering a reward of up to $10 million through its Rewards for Justice (RFJ) program for information about government-linked foreign hackers linked to malicious cyber activities against U.S. critical infrastructure. This is a clear indication that the authorities are committed to protecting their citizens and their interests from these types of attacks.

    The Salt Typhoon hackers have been breaching telecommunications companies since at least 2019, with recent months seeing a surge in activity as they exploited privilege escalation and Web UI command injection vulnerabilities in unpatched Cisco IOS XE network devices. The most recent breach includes a U.S. internet service provider (ISP), a U.S.-based affiliate of a U.K. telecommunications provider, an Italian ISP, a South African telecom provider, and a large Thai telecommunications provider.

    Cisco has also revealed that the Chinese hackers use a custom JumbledPath malicious tool to stealthily monitor network traffic and likely capture sensitive data from compromised U.S. telecommunication providers' networks. This further highlights the level of sophistication and danger posed by these hackers.

    In response to these breaches, U.S. authorities are considering banning TP-Link routers if an ongoing investigation finds their use in cyberattacks poses a national security risk. They are also reportedly planning to ban China Telecom's last active operations in the United States.

    Overall, the Salt Typhoon hackers have demonstrated a level of skill and audacity that is all too common among state-sponsored hackers. The authorities are taking the situation seriously and are willing to engage with the public in an effort to gather more information about these cyber-espionage efforts. As this story continues to unfold, one thing is clear: the Salt Typhoon hackers pose a significant threat to global cybersecurity and their actions must be taken seriously by governments and law enforcement agencies around the world.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Salt-Typhoon-Hackers-Unmasking-the-Cyber-Spies-Behind-the-Telecom-Breaches-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/fbi-seeks-help-to-unmask-salt-typhoon-hackers-behind-telecom-breaches/

  • https://apnews.com/article/china-hacking-salt-typhoon-trump-fbi-41ca253307e3eba2c34b3dc34dadcbeb


  • Published: Fri Apr 25 06:36:13 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us