Formation | 2020 |
---|---|
Type | Advanced persistent threat |
Purpose | Cyber espionage, counterintelligence, data exfiltration |
Location | |
Affiliations | Ministry of State Security |
Salt Typhoon is an advanced persistent threat actor believed to be operated by China's Ministry of State Security (MSS) which has conducted high profile cyber espionage campaigns, particularly against the United States. The group's operations place an emphasis on counterintelligence targets in the United States and data theft of key corporate intellectual property. The group has infiltrated targets in dozens of other countries on nearly every continent. [1] Former NSA analyst Terry Dunlap has described the group as a "component of China's 100-Year Strategy." [2]
Salt Typhoon is widely understood to be operated by China's Ministry of State Security (MSS), its foreign intelligence service and secret police. [3] [4] The Chinese embassy denied all allegations, saying it was "unfounded and irresponsible smears and slanders". [5]
According to Trend Micro, the group is a "well-organized group with a clear division of labor" whereby attacks targeting different regions and industries are launched by distinct actors, suggesting the group consists of various teams, "further highlighting the complexity of the group's operations." [6] [7]
In late 2024 U.S. officials announced that hackers affiliated with Salt Typhoon had accessed the computer systems of nine U.S. telecommunications companies, later acknowledged to include Verizon, AT&T, T-Mobile, Spectrum, Lumen, Consolidated Communications, and Windstream. [8] [9] [10] The attack targeted U.S. broadband networks, particularly core network components, including routers manufactured by Cisco, which route large portions of the Internet. [3] [4] In October 2024, U.S. officials revealed that the group had compromised internet service provider (ISP) systems used to fulfill CALEA requests used by U.S. law enforcement and intelligence agencies to conduct court-authorized wiretapping. [9]
The hackers were able to access metadata of users calls and text messages, including date and time stamps, source and destination IP addresses, and phone numbers from over a million users; most of which were located in the Washington D.C. metro area. In some cases, the hackers were able to obtain audio recordings of telephone calls made by high profile individuals. [11] Such individuals reportedly included staff of the Kamala Harris 2024 presidential campaign, as well as phones belonging to Donald Trump and JD Vance. [12] According to deputy national security advisor Anne Neuberger, a "large number" of the individuals whose data was directly accessed were "government targets of interest." [11]
In September 2024, reports first emerged that a severe cyberattack had compromised U.S. telecommunications systems. US officials stated that the campaign was likely underway for one to two years prior to its discovery, with several dozen countries compromised in the hack, including those in Europe and the Indo-Pacific. [13] The campaign was reportedly "intended as a Chinese espionage program focused on key government officials [and] key corporate [intellectual property]." [3] [14]
Salt Typhoon reportedly employs a Windows kernel-mode rootkit, Demodex (name given by Kaspersky Lab [15] ), to gain remote control [16] over their targeted servers. [17] They demonstrate a high level of sophistication and use anti-forensic and anti-analysis techniques to evade detection. [17]
According to The New York Times , Salt Typhoon is unique in focusing primarily on counterintelligence targets. [18] In addition to U.S. Internet service providers, the Slovak cybersecurity firm ESET says Salt Typhoon has previously broken into hotels and government agencies worldwide. [19] [20]
Salt Typhoon is the name assigned by Microsoft and is the one most widely used to describe the group. [19] The group has also variously been called: