In a recent cybersecurity breach, state-sponsored actors believed to be operating under Beijing’s influence have infiltrated several U.S. internet service providers (ISPs) as part of an elaborate cyber espionage campaign aimed at extracting confidential information. This alarming development was reported by The Wall Street Journal on Wednesday.

The breach has been attributed to a threat actor tagged by Microsoft as Salt Typhoon, also recognized under the monikers FamousSparrow and GhostEmperor. This group has a history of orchestrating sophisticated cyber operations targeting various entities across the globe.

Sources familiar with the investigation indicated that efforts are underway to determine if the hackers managed to breach Cisco Systems routers, which serve as pivotal components for directing substantial volumes of internet traffic. Such an intrusion could allow the assailants to access critical communications and sensitive data across multiple networks.

The primary objective of these cyber intrusions appears to be establishing a lasting presence within the targeted networks, which would facilitate ongoing data collection and potentially enable further cyber assaults.

GhostEmperor, which first emerged into public awareness in October 2021, was previously noted for its intricate campaign exploiting a rootkit, known as Demodex, to penetrate networks in Southeast Asia. The group’s operations were reported to target high-profile organizations in countries including Malaysia, Thailand, and Vietnam, as well as extending its reach to notable locations such as Egypt and Afghanistan.

Most recently, in July 2024, cybersecurity firm Sygnia disclosed that an unnamed client had suffered a breach linked to this threat actor in 2023, which allowed unauthorized access to a partner’s network. In the course of their investigation, several compromised servers and workstations were identified, revealing the deployment of multiple tools for communication with command-and-control servers, including a variant of the aforementioned Demodex rootkit.

This breach follows closely behind an announcement from the U.S. government regarding the disruption of a botnet comprising approximately 260,000 devices, dubbed Raptor Train, which is tied to a different hacking group linked to Beijing, known as Flax Typhoon. Such incidents are indicative of an ongoing pattern of cyber espionage orchestrated by Chinese state actors, which seek to compromise critical infrastructure, particularly within the telecommunications and ISP sectors.

The application of MITRE ATT&CK frameworks can elucidate potential tactics employed in these attacks. Techniques such as initial access, which may involve exploiting vulnerabilities within Cisco routers, and persistence, which entails maintaining access over extended periods, are likely involved. Additionally, privilege escalation could have been employed to gain higher levels of access within the compromised networks, further exacerbating the risk to organizational security.

This escalation in cyber threats emphasizes the imperative for robust cybersecurity measures, as businesses must remain vigilant amid increasing risks associated with state-sponsored cyber activities targeting pivotal infrastructure. As organizations navigate this complex landscape, understanding the evolving tactics of threat actors becomes crucial in safeguarding sensitive information and maintaining operational integrity.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.