Chinese Hacking Group Salt Typhoon Keeps Targeting Telecoms Despite US Sanctions

computer hacker

Salt Typhoon, a Chinese state-backed hacking group, remains active despite U.S. sanctions. The group continues to infiltrate telecom providers worldwide, exploiting vulnerabilities to access sensitive data.

Persistent Cyber Threat

Despite U.S. sanctions, the Chinese state-linked hacking group Salt Typhoon (also known as RedMike) continues to breach telecom providers worldwide, according to a report by Recorded Future.

Ongoing Attacks on Global Telecoms

Between December 2024 and January 2025, Salt Typhoon infiltrated five telecom firms across the U.S., U.K., Italy, South Africa, and Thailand. The group also conducted reconnaissance on Myanmar’s Mytel telecom infrastructure.

Targeting Critical Infrastructure

Salt Typhoon exploited vulnerabilities (CVE-20232-0198 and CVE-2023-20273) in unpatched Cisco devices, compromising over 1,000 systems globally, with a focus on telecom networks. Universities like UC and Utah Tech were also targeted, likely for research data on telecommunications and technology.

Sanctions Fail to Deter Attacks

In January, the U.S. sanctioned Sichuan Juxinhe Network Technology, linking it to Salt Typhoon. However, researchers believe the group will persist in targeting global telecom infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *