Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Salt Typhoon Hacks European Telecom

October 23, 2025
Reading Time: 4 mins read
in Incidents
Ransomware Hits Jewett Cameron

China-linked espionage group Salt Typhoon successfully breached a European telecommunications firm in July 2025, continuing a widespread global campaign that has been active for at least a year. This incident follows a major exposure in late 2024 when the U.S. attributed a large-scale cyberespionage campaign targeting global telecoms to the state-backed group. At that time, a senior White House official, Anne Neuberger, revealed that Salt Typhoon had compromised telecommunications companies in dozens of countries, including at least eight U.S. firms. The group, also tracked as Earth Estries, FamousSparrow, and GhostEmperor, has demonstrated a sustained focus on this sector worldwide.

The initial breach in July 2025 was facilitated by exploiting a vulnerability in a Citrix NetScaler Gateway appliance. Darktrace, which detected the intrusion, noted that the attack likely began in the first week of July. After gaining a foothold through the gateway, the attackers quickly pivoted to Citrix Virtual Delivery Agent (VDA) hosts within the client’s network. Compounding their stealth, the initial access activities originated from an endpoint potentially associated with the SoftEther VPN service, suggesting the attackers used infrastructure obfuscation techniques from the very beginning of the operation.

To maintain persistence and control, the nation-state actors deployed a custom backdoor named SNAPPYBEE (also known as Deed RAT). This malware was delivered using a sophisticated technique known as DLL sideloading, where the attackers leverage legitimate antivirus executables from brands like Norton, Bkav, and IObit to load their malicious code. By piggybacking on trusted software, they aimed to bypass traditional security controls that might flag unknown executables, making the deployment significantly stealthier and harder to trace.

For command and control (C2), the attackers relied on LightNode VPS servers. They communicated via both standard HTTP and an unknown TCP protocol, a tactic designed to confuse or evade detection systems. The SNAPPYBEE backdoor was observed sending HTTP POST requests that were carefully crafted to mimic legitimate Internet Explorer traffic, further blending in with normal network activity. One C2 domain, aar.gandhibludtric[.]com, and its associated IP address were specifically tied back to the Salt Typhoon group, adding to the evidence for the attribution.

Darktrace’s security platform ultimately identified the sophisticated cyber espionage activity and successfully mitigated the intrusion before the attackers could escalate their actions or achieve their ultimate goals. Based on overlaps in tactics, techniques, procedures (TTPs), staging patterns, infrastructure, and the specific malware used, Darktrace assessed with moderate confidence that the activity was consistent with the known operations of Salt Typhoon (Earth Estries). The incident underscores the critical need for security solutions that move beyond traditional, signature-based defenses to detect and stop advanced persistent threats, highlighting that early detection of unusual behavior is essential for thwarting stealthy, nation-state actors.

Reference:

  • China Linked Salt Typhoon Breaches European Telecom Network Through Citrix Exploit
Tags: cyber incidentsCyber Incidents 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Ransomware Hits Jewett Cameron

Ransomware Hits Jewett Cameron

October 23, 2025
Union Cyberattack Raises Concerns

JFL Loses 800K Weekly After Hack

October 23, 2025
Union Cyberattack Raises Concerns

Union Cyberattack Raises Concerns

October 22, 2025
Union Cyberattack Raises Concerns

Romanian Prisoner Hacks Prison IT

October 22, 2025
Union Cyberattack Raises Concerns

Hackers Claim Data On NSA Officials

October 22, 2025
Russian Hackers Leak UK MoD Files

Muji Stops Online Sales After Attack

October 21, 2025

Latest Alerts

Gift Card Heist Via Cloud Hackers

MuddyWater Launches Global Spying

Fake Zoom Calls Target Ukraine Aid

Copilot Flaw Exposes Sensitive Data

PolarEdge Expands Router Botnet

Google Finds New Russian Malware

Subscribe to our newsletter

    Latest Incidents

    Ransomware Hits Jewett Cameron

    Salt Typhoon Hacks European Telecom

    JFL Loses 800K Weekly After Hack

    Union Cyberattack Raises Concerns

    Romanian Prisoner Hacks Prison IT

    Hackers Claim Data On NSA Officials

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial