Connect with us

News

What is Salt Typhoon? A security expert explains the Chinese hackers and their attack on US telecommunications networks

Published

on

By Richard Forno, University of Maryland, Baltimore County; The Conversation

boy wearing hoodie holding out red card with codes in front

Salt Typhoon exploited technical vulnerabilities in some of the cybersecurity products like firewalls used to protect large organizations. (Pixabay Photo)

Cyberattacks linked to the Chinese government that compromised large portions of the American telecommunications network have the U.S. government sounding the alarm. The chair of the Senate Intelligence Committee, Sen. Mark Warner (D-VA), has called it the “worst telecom hack in our nation’s history” and noted that it makes prior cyberattacks by Russian operatives look like “child’s play” by comparison.

The complex cyberattack, carried out by a group of Chinese hackers dubbed Salt Typhoon, began as far back as 2022. Its purpose, according to U.S. officials, was to give Chinese operatives persistent access to telecommunications networks across the U.S. by compromising devices like routers and switches run by companies like AT&T, Verizon, Lumen and others.

This attack comes on the heels of reports that the FBI and Cybersecurity and Infrastructure Security Agency were assisting telephone companies with countering other China-connected compromises of their networks. The earlier hacking was part of an attack targeting people in the Washington area in government or political roles, including candidates for the 2024 presidential election.

But Salt Typhoon is not just targeting Americans. Research from security vendor Trend Micro shows that attacks by Salt Typhoon compromised other critical infrastructure around the world in recent years. U.S. officials have confirmed these findings as well – and their level of concern is noteworthy.

Chinese officials have denied the allegations that they’re behind this operation, as they have in response to allegations about previous cyberattacks.

As a cybersecurity researcher, I find this attack is indeed breathtaking in its scope and severity. But it’s not surprising that such an incident took place. Many organizations of all sizes still fail to follow good cybersecurity practices, have limited resources, or operate IT infrastructures that are too complex to effectively monitor, manage and secure.

How bad is it?

Salt Typhoon exploited technical vulnerabilities in some of the cybersecurity products like firewalls used to protect large organizations. Once inside the network, the attackers used more conventional tools and knowledge to expand their reach, gather information, stay hidden and deploy malware for later use.

According to the FBI, Salt Typhoon allowed Chinese officials to obtain a large amount of records showing where, when and who specific individuals were communicating with. In some cases, they noted that Salt Typhoon gave access to the contents of phone calls and text messages as well.

‘PBS News Hour’ reports on updates from the White House about Salt Typhoon.

Salt Typhoon also compromised the private portals, or backdoors, that telephone companies provide to law enforcement to request court-ordered monitoring of phone numbers pursuant to investigations. This is also the same portal that is used by U.S. intelligence to surveil foreign targets inside the United States.

As a result, Salt Typhoon attackers may have obtained information about which Chinese spies and informants counterintelligence agencies were monitoring – knowledge that can help those targets try to evade such surveillance.

On Dec. 3, the Cybersecurity and Infrastructure Security Agency, National Security Agency and FBI, along with their counterparts in Australia, New Zealand and Canada, released guidance to the public on how to address the Salt Typhoon attack. Their Enhanced Visibility and Hardening Guidance for Communications Infrastructure guide essentially reiterates best cybersecurity practices for organizations that could help mitigate the impact of Salt Typhoon or future copycat attacks.

It does, however, include recommendations to protect specific telecommunication equipment for some of the Cisco products that were targeted in this attack.

As of this writing, U.S. officials and affected companies have not been able to fully ascertain the scope, depth and severity of the attack – or remove the attackers from compromised systems – even though this attack has been ongoing for months.

What can be done?

U.S. officials have said that many of the ways Salt Typhoon penetrated its targets was through existing weaknesses with the infrastructure. As I’ve written previously, failing to implement basic cybersecurity best practices can lead to debilitating incidents for organizations of all sizes. Given how dependent the world is on networked information systems, it is more important than ever to maintain cybersecurity programs that make it difficult for attacks to succeed, especially for critical infrastructure like the phone network.

In addition to following the best practices guidance issued by the Cybersecurity and Infrastructure Security Agency earlier this week, organizations should remain vigilant. They should monitor not only the news for information about this attack but the various free, proprietary or private threat intelligence feeds and informal professional networks to stay up to date on attackers’ tactics and techniques – and ways to counter them.

Companies and governments should also ensure their IT departments and cybersecurity programs are adequately staffed and funded to meet their needs and ensure that best practices are implemented. The Federal Communications Commission is already threatening companies with fines for failing to bolster their defenses against Chinese hacking.

Although any illicit surveillance is concerning, the average American probably has little to worry about from Salt Typhoon. It’s unlikely that your family phone calls or text messages to friends are of interest to the Chinese government. However, if you want to increase your security and privacy a bit, consider using end-to-end encrypted messaging services like Signal, FaceTime or Messages.

Also make sure you’re not using default or easily guessed passwords on your devices, including your home router. And consider using two-factor authentication to further strengthen the security of any critical internet accounts.

Backdoors and bad guys

Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.

So it’s somewhat ironic that one of the countermeasures recommended by the government to guard against Salt Typhoon spying is to use strongly encrypted services for phone calls and text messages – encryption capabilities that it has spent decades trying to undermine so that only “the good guys” can use it.The Conversation

Richard Forno, Principal Lecturer, CSEE & Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Maria in Vancouver

Lifestyle5 days ago

Upgrade Your Life in 2025

It’s a brand new year and a wonderful opportunity to become a brand new you! The word upgrade can mean...

Maria in Vancouver3 weeks ago

Fantabulous Christmas Party Ideas

It’s that special and merry time of the year when you get to have a wonderful excuse to celebrate amongst...

Lifestyle4 weeks ago

How To Do Christmas & Hanukkah This Year

Christmas 2024 is literally just around the corner! Here in Vancouver, we just finished celebrating Taylor Swift’s last leg of...

Lifestyle2 months ago

Nobody Wants This…IRL (In Real Life)

Just like everyone else who’s binged on Netflix series, “Nobody Wants This” — a romcom about a newly single rabbi...

Lifestyle2 months ago

Family Estrangement: Why It’s Okay

Family estrangement is the absence of a previously long-standing relationship between family members via emotional or physical distancing to the...

Lifestyle4 months ago

Becoming Your Best Version

By Matter Laurel-Zalko As a woman, I’m constantly evolving. I’m constantly changing towards my better version each year. Actually, I’m...

Lifestyle4 months ago

The True Power of Manifestation

I truly believe in the power of our imagination and that what we believe in our lives is an actual...

Maria in Vancouver5 months ago

DECORATE YOUR HOME 101

By Matte Laurel-Zalko Our home interiors are an insight into our brains and our hearts. It is our own collaboration...

Maria in Vancouver5 months ago

Guide to Planning a Wedding in 2 Months

By Matte Laurel-Zalko Are you recently engaged and find yourself in a bit of a pickle because you and your...

Maria in Vancouver6 months ago

Staying Cool and Stylish this Summer

By Matte Laurel-Zalko I couldn’t agree more when the great late Ella Fitzgerald sang “Summertime and the livin’ is easy.”...