Salt Typhoon Exploits Vulnerabilities in Network Edge Devices to Target 600 Organizations Globally

Date: Aug 28, 2025
Categories: Cyber Espionage / Network Security

The advanced persistent threat (APT) group known as Salt Typhoon, linked to China, has ramped up its cyberattacks on networks worldwide, impacting sectors such as telecommunications, government, transportation, hospitality, and military infrastructure. According to a recent joint cybersecurity advisory, these attackers primarily target major telecommunications backbone routers, as well as provider edge (PE) and customer edge (CE) routers. They leverage compromised devices and trusted connections to infiltrate additional networks, often modifying routers to ensure continuous, long-term access. The advisory, issued by authorities from 13 countries, associates this malicious activity with three Chinese firms: Sichuan Juxinhe Network Technology Co., Ltd., Beijing Huanyu Tianqiong Information Technology Co., Ltd., and Sichuan Zhixin Ruijie Network Technology Co., Ltd.

Salt Typhoon Exploits Vulnerabilities in Edge Network Devices to Compromise 600 Organizations Globally

In a significant escalation of cyber threats, the China-linked advanced persistent threat (APT) group known as Salt Typhoon has successfully infiltrated networks across a diverse range of sectors, affecting approximately 600 organizations worldwide. This includes critical industries such as telecommunications, government, transportation, hospitality, and military infrastructure. A joint cybersecurity advisory released recently highlights the modus operandi of these actors, who concentrate their efforts on large backbone routers utilized by major telecommunications providers, specifically targeting provider edge (PE) and customer edge (CE) routers.

According to cybersecurity experts, Salt Typhoon’s strategy extends beyond mere intrusion; these actors manipulate compromised devices and established trusted connections to navigate into multiple networks. They are adept at modifying routers to secure sustained, long-term access, thereby increasing the difficulty of detection and remediation efforts. This tactic emphasizes the importance of rigorous monitoring of network equipment and the integrity of trusted connections.

The advisory, drawing from contributions by cybersecurity authorities across 13 nations, specifically links the malicious activities to three Chinese entities: Sichuan Juxinhe Network Technology Co., Ltd., Beijing Huanyu Tianqiong Information Technology Co., Ltd., and Sichuan Zhixin Ruijie Network Technology Co., Ltd. These organizations are believed to provide the technological backbone enabling the ongoing cyber incursions.

Business owners should be cognizant that such attacks pose significant risks not only to their individual operations but also to the broader integrity of the internet infrastructure. The implications of these infiltrations extend to the potential leakage of sensitive data, operational disruptions, and financial losses. In this context, the enhancement of cybersecurity measures is imperative for organizations, especially in sectors identified as targets.

In light of the tactics employed by Salt Typhoon, it is critical to consider the MITRE ATT&CK framework for a better understanding of the techniques utilized in their operations. Initial access likely involved exploiting vulnerabilities in network devices, while persistence may have been achieved through modifications to router configurations. Privilege escalation techniques could have facilitated increased access to sensitive systems, underscoring the need for comprehensive security audits and stringent access controls.

As organizations navigate an increasingly complex threat landscape, the revelations surrounding Salt Typhoon serve as a sobering reminder of the vulnerabilities inherent in network infrastructure. Business leaders are encouraged to remain vigilant by implementing robust monitoring protocols and adopting a proactive approach to identify and mitigate potential breaches before they escalate into significant issues. Cybersecurity should not be viewed as a one-time investment but as a continuous process critical to sustaining organizational integrity in the face of evolving threats.

Source link