US, Allies Link Beijing-Backed Salt Typhoon Hacking Group to 2 More Chinese Companies
Authorities say these malicious cyber threat actors have compromised networks worldwide to feed a Chinese state-sponsored espionage system.
They named three Chinese companies linked to the campaign widely known as Salt Typhoon.
“These companies provide cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security,” reads the report, co-signed by agencies in the United States, Australia, Canada, New Zealand, the UK, the Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, Poland, and Spain.
The authorities note that this advanced persistent threat (APT) overlaps with what Microsoft tracks as Salt Typhoon, CrowdStrike as Operator Panda, and Insikt Group as RedMike, as well as other cyber researchers using different tracking methods and names.
In addition to telecommunication networks, Chinese state-sponsored hackers have stolen data from internet service providers and breached the lodging and transportation sectors, which collectively give the Chinese regime the ability to track targets’ communications and movements worldwide, according to the report. The group has also breached defense networks.
“These APT actors are exploiting vulnerabilities in the large backbone routers of telecommunications providers—specifically provider edge and customer edge routers that often lack visibility and are difficult to monitor—to gain and maintain persistent access,” CISA stated. “They often modify router firmware and configurations to evade detection and establish long-term footholds.”
The campaign has been “performing malicious operations globally since at least 2021,” according to the report, mainly taking advantage of publicly known vulnerabilities.
According to the report, these APT actors have not been observed to use any zero-day exploits, which are vulnerabilities that providers have not yet had the chance to patch, instead relying on a likely expanding collection of avoidable infrastructure weaknesses.
It urged the prioritization of a handful of the most widely exploited vulnerabilities, most of which have been publicly disclosed since late 2023 or early 2024, and one related to the Smart Install feature of Cisco IOS software, which was published in 2018.
The report includes a case study that breaks down the commands used by APT actors in a specific breach.
It also includes detailed guidelines for cyber threat hunting. Authorities have warned that APT actors tend to gain long-term access to networks, and partial responses to evict them may only alert the hackers, resulting in more stealth and potentially disrupting ongoing investigations.
“Where possible, gaining a full understanding of the APT actors’ extent of access into networks followed by simultaneous measures to remove them may be necessary to achieve a complete and lasting eviction,” the report states.
.


