China’s Salt Typhoon Hacking Campaign Targets U.S. Internet Providers

A new cyberattack campaign linked to the Chinese government has surfaced, raising serious concerns about national security. Dubbed “Salt Typhoon,” this campaign is the latest in a series of Chinese hacking operations targeting U.S. infrastructure. The hackers infiltrated U.S. internet service providers (ISPs) using a previously undiscovered software vulnerability, making it possible to access critical systems and sensitive data.

The group behind the attack, believed to be a state-sponsored collective, has been quietly embedding itself into U.S. broadband networks, exploiting vulnerabilities in widely used software from Versa Networks. This network management tool is popular among ISPs and managed service providers (MSPs), which makes it a prime target for cybercriminals looking to compromise both service providers and their customers. According to Black Lotus Labs, the threat research division of Lumen Technologies, the hackers managed to steal administrative login credentials from U.S. ISPs, which could be used to gain broader access to these systems undetected.

The hacking group is using a sophisticated method that does not alter Java files on disk but instead operates in-memory, evading traditional breach prevention systems. This level of sophistication suggests that the group is highly skilled and well-resourced, with the capacity to cause significant damage. Analysts warn that these vulnerabilities could be exploited to disrupt communication infrastructure during future conflicts between China and the U.S. This is particularly concerning given the growing tensions over Taiwan, as well as China’s increasing cyber capabilities.

While some companies have already implemented security patches released by Versa Networks, the full scope of the breach is still being assessed. Experts believe that the campaign, which may have started as early as June, is ongoing and may involve other undisclosed vulnerabilities​. As a result, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been alerted, and efforts to mitigate further risks are underway.

This cyber espionage campaign bears similarities to another China-linked hacking operation known as “Volt Typhoon,” which targeted U.S. critical infrastructure earlier in 2023. Both operations follow a pattern of targeting key sectors like telecommunications, utilities, and defense, which could have devastating effects if compromised during a time of geopolitical tension. The Volt Typhoon operation, revealed by Microsoft and U.S. government agencies, also used a zero-day vulnerability in a Versa Networks product to infiltrate ISPs. Experts suspect that these campaigns are part of a larger, coordinated effort by the Chinese government to gain a foothold in critical U.S. infrastructure​.

As the Salt Typhoon campaign unfolds, the risk of real-world harm increases. By compromising telecommunications networks, China could potentially disrupt emergency communications, internet access, or even military operations in the event of conflict. This cyberattack follows a broader trend of Chinese cyber aggression that has prompted U.S. intelligence agencies to issue warnings about China’s growing cyber capabilities and their potential to harm national security.

The U.S. government has been intensifying its efforts to counter these kinds of cyber threats, but the extent of Salt Typhoon’s damage is still unclear. The breach highlights the vulnerability of modern digital infrastructure and the necessity for ongoing vigilance and security enhancements, especially as international tensions continue to rise.

In response to these developments, the Biden administration has urged private sector companies to enhance their cybersecurity defenses and implement stronger protections against state-sponsored cyberattacks. Meanwhile, U.S. intelligence agencies are collaborating with allies to share information and improve detection methods in an effort to mitigate future threats from state actors like China.