TechCrunch News 02月13日
China’s Salt Typhoon hackers continue to breach telecom firms despite US sanctions
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

尽管美国政府对中国政府支持的黑客组织Salt Typhoon实施了制裁,但安全研究人员表示,该组织仍在持续攻击电信供应商。Recorded Future的报告显示,Salt Typhoon在2024年12月至2025年1月期间入侵了五家电信公司,其中包括一家位于美国的英国电信供应商的子公司、一家美国互联网服务提供商,以及意大利、南非和泰国的电信公司。该组织还对缅甸电信供应商Mytel的基础设施资产进行了侦察。Salt Typhoon利用Cisco IOS XE软件中的两个漏洞进行攻击,并试图入侵全球超过1000台Cisco设备,尤其关注与电信供应商网络相关的设备。此外,他们还攻击了加州大学和犹他科技大学等高校,可能旨在获取与电信、工程和技术领域相关的研究成果。尽管美国政府已对与该组织有关联的公司实施制裁,但Recorded Future预计Salt Typhoon将继续攻击美国和其他地区的电信供应商。

🚨Salt Typhoon是一个与中国政府有关联的黑客组织,尽管美国政府对其进行了制裁,但该组织仍在继续攻击电信供应商。

🌐Salt Typhoon入侵了多家电信公司,包括美国的英国电信供应商子公司、美国互联网服务提供商,以及意大利、南非和泰国的电信公司。此外,他们还对缅甸电信供应商Mytel的基础设施资产进行了侦察。

🛡️Salt Typhoon利用Cisco IOS XE软件中的CVE-20232-0198和CVE-2023-20273两个漏洞进行攻击,并试图入侵全球超过1000台Cisco设备,尤其关注与电信供应商网络相关的设备。

🏫Salt Typhoon还攻击了加州大学和犹他科技大学等高校,可能旨在获取与电信、工程和技术领域相关的研究成果。

санкции Несмотря на制裁,Recorded Future预计Salt Typhoon将继续攻击美国和其他地区的电信供应商。

Security researchers say the Chinese government-linked hacking group, Salt Typhoon, is continuing to compromise telecommunications providers, despite the recent sanctions imposed by the U.S. government on the group. 

In a report shared with TechCrunch, threat intelligence firm Recorded Future said it had observed Salt Typhoon — which the company tracks as “RedMike” — breaching five telecommunications firms between December 2024 and January 2025.

Salt Typhoon made headlines last September after it was revealed that the group had infiltrated several U.S. phone and internet giants, including AT&T and Verizon, to gain access to the private communications of senior U.S. government officials and political figures.

Salt Typhoon also hacked into the systems that law enforcement agencies use for court-authorized collection of customer data, potentially accessing sensitive data such as the identities of Chinese targets of U.S. surveillance. 

Recorded Future declined to name Salt Typhoon’s latest victims, but said they include a U.S.-based affiliate of a prominent U.K. telecommunications provider; a U.S. internet service provider, and telecommunications companies in Italy, South Africa and Thailand. 

The hackers also performed reconnaissance — the practice of covertly discovering and collecting information about a system — on multiple infrastructure assets operated by Myanmar-based telecommunications provider, Mytel, according to Recorded Future.

To carry out these attacks, Salt Typhoon exploited two vulnerabilities (tracked as CVE-20232-0198 and CVE-2023-20273) to compromise unpatched Cisco devices running Cisco IOS XE software. The hacking group has attempted to compromise more than 1,000 Cisco devices globally, focusing particularly on devices associated with telecommunications providers’ networks, Recorded Future said. 

Recorded Future said it had also observed Salt Typhoon targeting devices associated with universities, including the University of California and Utah Tech. The researchers said the hacking group “possibly targeted these universities to access research in areas related to telecommunications, engineering, and technology.” 

The U.S. government has sanctioned companies linked to the group. In January, the U.S. Treasury Department — itself targeted by Chinese government hackers recently — said it had sanctioned a China-based cybersecurity company known as Sichuan Juxinhe Network Technology, which it says is directly linked to Salt Typhoon.

Recorded Future’s researchers say despite this action, it expects Salt Typhoon to continue targeting telecommunications providers in the U.S. and elsewhere.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Salt Typhoon 网络安全 电信攻击 中国黑客
相关文章