Salt Typhoon Cyberattacks Target Telecommunications Worldwide, Stealing Call Data

Massive Breach in Telecommunications

A sophisticated cyberattack campaign known as Salt Typhoon has been actively breaching telecommunications networks across the world. Despite various efforts by governments and security agencies to stop these attacks, the hackers have continued their operations into the new year. According to cybersecurity researchers from Insikt Group, this attack campaign attempted to infiltrate over 1,000 Cisco network devices worldwide between December and January. These devices are critical components of telecommunication networks, which means that compromising them can allow hackers to gain deep access to sensitive communication systems.

The attack was global in scale, targeting telecommunication providers across multiple countries, including the United States, South Africa, Italy, and Thailand. Researchers found that a major telecommunications provider in South Africa and a U.S.-based subsidiary of a UK telecom company were among the targeted organizations. It appears that the hackers selected their targets based on their connections to telecom infrastructure, allowing them to gather information and possibly disrupt communications in strategic locations.

Furthermore, security experts discovered that the Salt Typhoon hackers had carried out reconnaissance activities in December on IP addresses owned by Mytel, a telecommunications provider based in Myanmar. Salt Typhoon hackers targeted Cisco devices primarily in the United States, South America, and India, while also attacking networks in over 100 other countries.

The researchers also uncovered evidence that the hackers targeted universities in Argentina, Bangladesh, Indonesia, Malaysia, Mexico, the Netherlands, Thailand, the U.S., and Vietnam. They believe that Salt Typhoon specifically focused on universities to gain access to valuable research in telecommunications, engineering, and advanced technology. Universities often have weaker security measures than corporations or government agencies, making them easier targets for cyberattacks.

Exploiting Network Weaknesses

For months, U.S. cybersecurity officials have warned about Salt Typhoon’s increasing cyber operations, which have breached at least nine major U.S. telecom companies. These companies are essential to national communication infrastructure, making them prime targets for state-sponsored cyber espionage.

The hackers reportedly used their deep access into these networks to steal call data and communication records from high-profile individuals. Once inside, they could intercept messages, track call logs, and monitor sensitive conversations between key figures.

To carry out these attacks, Salt Typhoon exploited known security vulnerabilities in Cisco devices. The two main security flaws they used were identified as CVE-2023-20198 and CVE-2023-20273. The first flaw allowed hackers to break into the system, while the second flaw enabled them to escalate their privileges and take full control of the infected network.

After successfully breaching the devices, the hackers reconfigured them, making it difficult to detect the intrusion. They then created a hidden connection to the compromised devices, which allowed them to maintain access indefinitely. This means they could return at any time without needing to break in again.

Insikt Group also discovered that the hackers had scanned for vulnerable Cisco devices multiple times, specifically on December 4, 10, 17, and 24, as well as January 13 and 23. This suggests that Salt Typhoon was continuously searching for new weaknesses and expanding its attack scope.

Even though hackers could access over 12,000 Cisco devices on the internet, they targeted only a select portion. This choice shows that they planned and executed their attacks deliberately rather than conducting random cyber intrusions.

Government Response and Ongoing Telecommunications Threats

The U.S. government has been closely monitoring Salt Typhoon’s activities for several months. In January, the Treasury Department announced new sanctions against a Chinese contractor believed to be directly involved in these telecommunications cyberattacks.

According to the Treasury Department, Salt Typhoon has been actively compromising U.S. telecommunications networks since 2019. However, their most recent attacks represent a significant escalation in China’s cyber operations against critical U.S. telecommunications infrastructure.

Beyond the immediate cyberattacks, experts believe Salt Typhoon’s activities pose a much larger strategic threat. By infiltrating telecommunications networks, state-backed cybercriminals can monitor private conversations, manipulate communication data, and even disrupt essential services. This could be used for surveillance, cyber warfare, or geopolitical intelligence gathering.

Despite growing concerns, U.S. authorities have struggled to fully contain the threat. The FBI and the Department of Homeland Security have not issued official statements regarding the latest telecommunications attack wave, and the Justice Department has provided little additional information.

Cybersecurity researchers strongly advise network administrators to check their Cisco devices for signs of exploitation, particularly on the dates identified in the attacks. They also urge organizations to update their security patches and implement stronger protection measures to prevent further intrusions. However, as long as telecommunications infrastructure remains vulnerable, the risk of future attacks remains high.

TOP 10 TRENDING ON NEWSINTERPRETATION

Chinese Hackers Secretly Breached Asian Telecom Networks for Years Without Being Detected

A new report by cybersecurity firm Sygnia reveals that...

Massive Espionage Blunder Jeopardizes US Spying on Houthis

Leaked text messages between top US officials may have...

BlackLock’s Dirty Secrets Exposed After Researchers “Hack the Hackers”

Cybersecurity researchers hacked into the systems of a ransomware...

APT36 Hackers fakes India Post to Deploy Malware on Windows and Android

Deceptive Website Targets Windows and Android Users In a recent...

DeepSeek Impersonation Ads Infect Users with Malware

Fake DeepSeek Ads Trick Users into a Trap Cybercriminals are...

Solar Power at Risk: Security Flaws Threaten Global Grids

Solar power is growing fast around the world, especially...

SparrowDoor 2.0: Chinese Hackers Deploy Powerful Malware in Global Attacks

A group of Chinese hackers called FamousSparrow is in...

U.S. Security Officials’ Private Info Is Accessible Online

Private Contact Information Easily Accessible The private contact details of...

Hackers Target Airports’ System with $10 Million Ransom Demand; Malaysia Refuses to Pay

Malaysia was recently hit by a major cyberattack. The...

Majorana 1 Quantum Chip: Overcoming Instability in Quantum Systems

Quantum computing is transforming the way complex problems are...

Massive Espionage Blunder Jeopardizes US Spying on Houthis

Leaked text messages between top US officials may have...

BlackLock’s Dirty Secrets Exposed After Researchers “Hack the Hackers”

Cybersecurity researchers hacked into the systems of a ransomware...

APT36 Hackers fakes India Post to Deploy Malware on Windows and Android

Deceptive Website Targets Windows and Android Users In a recent...

DeepSeek Impersonation Ads Infect Users with Malware

Fake DeepSeek Ads Trick Users into a Trap Cybercriminals are...

Solar Power at Risk: Security Flaws Threaten Global Grids

Solar power is growing fast around the world, especially...

SparrowDoor 2.0: Chinese Hackers Deploy Powerful Malware in Global Attacks

A group of Chinese hackers called FamousSparrow is in...

U.S. Security Officials’ Private Info Is Accessible Online

Private Contact Information Easily Accessible The private contact details of...

Related Articles

Popular Categories

error: Content is protected !!