Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers find code flaws and code flaws that allow attackers to reissue deleted extensions with the same name

No Code Website Builder Framers reach a $20 billion valuation

Mark Cuba’s war with America’s $5 trillion healthcare machine: “They can’t respond quickly”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Salt Typhoon exploits defects in Cisco, Ivanti and Palo Alto infringing 600 organizations around the world
Identity

Salt Typhoon exploits defects in Cisco, Ivanti and Palo Alto infringing 600 organizations around the world

userBy userAugust 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The China-related Advanced Persistent Threat (APT) actor known as Salt Typhoon continues attacks targeting networks around the world, including organizations in the telecommunications, government, transportation, accommodation and military infrastructure sectors.

“These actors focus on major telecommunications providers’ large backbone routers, as well as provider edge (PE) and customer edge (CE) routers, but refer to other networks for compromised devices and trusted connections, according to a joint cybersecurity advisory issued Wednesday. “These actors often change routers to maintain sustained, long-term access to the network.”

The bulletin, courtesy of authorities from 13 countries, includes three Chinese companies, Sichuan Juxine Network Technology Co., Ltd., Beijing Huanyu Tianqiong Informationg Technology Co., Ltd. and Sichuan Zhixin Ruijie Network Technology Co., Ltd.

Cybersecurity

According to the agency, these companies provide Beijing with the ability to globally identify and track targeted communications and movements from data stolen from intrusions, particularly communications and internet service providers (ISPs), providing cyber-related products and services to China’s intelligence agency.

Brett Leatherman, head of the US Federal Bureau of Investigation’s cyber division, said Salt Timson has been active since at least 2019 and is engaged in permanent espionage activities aimed at “violating global communication privacy and security norms.”

In a standalone alert issued today, Dutch intelligence agencies MIVD and AIVD said domestic organizations “didn’t give the same level of attention from US salt typhoon hackers.” However, there is no evidence that hackers have further invaded these networks.

Countries that jointly sealed security advisories include Australia, Canada, the Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, New Zealand, Poland, Spain, the UK and the United States.

“Since at least 2021, this activity has targeted organizations in key sectors around the world, including government, communications, transportation, accommodation and military infrastructure, with clusters of activity observed in the UK,” the National Cybersecurity Centre said.

According to the Wall Street Journal and the Washington Post, the hacking crew attacked more than 600 organizations, including 200 and 80 countries in the US, expanding the target’s focus to other sectors and regions.

Salt Typhoon, which overlaps with activities tracked as Ghostemperor, Operator Panda, Redmike, and UNC5807, has been observed to gain initial access through exploitation of exposed network edge devices from Cisco (CVE-2018-0171, CVE-2023-20198, and CVE-2023-20273), CVE-2023-46023 CVE-2024-21887), and Palo Alto Networks (CVE-2024-3400).

“APT actors can target edge devices regardless of who owns a particular device,” the agency said. “Devices owned by entities that do not match the core targets of interested parties still provide opportunities for targets of interest to use in their attack routes.”

A compromised device is utilized to pivot into other networks, and in some cases changes the device’s configuration and adds a general Routing Encapsulation (GRE) tunnel for permanent access and data removal.

Persistent access to the target network changes the Access Control List (ACLS), adds an IP address under control, opens standard, opens non-standard ports, executes commands in an on-box Linux container on a supported Cisco networking device, handles locally within the environment, and moves horizontally.

Additionally, attackers use authentication protocols such as the Terminal Access Controller Access Control System (TACACS+) to allow lateral movement across network devices, while simultaneously performing extensive discovery actions, capturing network traffic containing entitlements through compromised routers, and digging deeper into the network.

Identity Security Risk Assessment

“APT officials have used native tools for the compromised system to collect PCAPs. The main purpose is to capture TACACS+ traffic on TCP port 49,” the agency said. “TACACS+ traffic is often used to manage network equipment and to authenticate with accounts and credentials of highly privileged network administrators, allowing actors to compromise additional accounts and perform lateral movements.”

In addition to that, Salt Typhoon has been observed, and the SSHD_OPERNS service on Cisco iOS XR devices creates a local user and grants IT sudo privileges to get the host OS root after logging in via TCP/57722.

Mandiant, owned by Google, one of the many industry partners that contributed to the advisory, said that familiarity with threat actor telecommunications systems offers them unique advantages and gives them an edge when it comes to defense evasion.

“The ecosystem of contractors, academics and other facilitators is at the heart of China’s cyberspy,” John Hultquist, chief analyst at the Google Threat Intelligence Group, told Hacker News. Contractors are used to build tools and valuable exploits, performing the dirty work of intrusion operations. They have contributed to the rapid evolution of these operations and are growing to an unprecedented scale. ”

“In addition to being a target for communication, we can use reporting hospitality and transport targets by this actor to closely investigate individuals. We can use information from these sectors to develop a big picture of who someone is talking to, where is they and where they are going.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAccording to Transunion, hackers say they stole the personal information of 4.4 million customers
Next Article Investors Are Lovely and Love | TechCrunch
user
  • Website

Related Posts

Researchers find code flaws and code flaws that allow attackers to reissue deleted extensions with the same name

August 28, 2025

Why Top Teams Prioritize Code-to-Cloud Mapping in 2025 AppSec

August 28, 2025

Hidden Vulnerabilities in Project Management Tools and How FluentPro Backups Protect them

August 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers find code flaws and code flaws that allow attackers to reissue deleted extensions with the same name

No Code Website Builder Framers reach a $20 billion valuation

Mark Cuba’s war with America’s $5 trillion healthcare machine: “They can’t respond quickly”

Honor’s Slim Magic V5 folding is fun to use, except for the huge camera bumps

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.