Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

China’s Salt Typhoon Hacked US Guard

July 16, 2025
Reading Time: 3 mins read
in News
Google Realeases Critical Chrome Update

A recent Department of Defense (DoD) report has revealed that “Salt Typhoon,” a Chinese state-sponsored hacking group, successfully breached the network of a US Army National Guard unit. This extensive compromise, active from March to December 2024, allowed the threat actors to collect sensitive configuration information and eavesdrop on communications with other units across every US state and at least four US territories. The stolen data included administrator credentials and network diagrams, providing a significant advantage for potential follow-on attacks against other National Guard entities and their interconnected systems.

The group, known for its persistent and sophisticated cyber espionage campaigns, has a documented history of targeting critical infrastructure.

Previously, Salt Typhoon was implicated in hacking major US telecommunications giants like AT&T, Verizon, and Lumen Technologies, specifically compromising wiretap systems. More recently, Canadian authorities and the FBI issued warnings about the group’s targeting of Canadian telecom providers to steal call records and private communications, demonstrating a consistent focus on communication networks and sensitive data.

The implications of the National Guard breach are particularly concerning. The DoD report highlights that Salt Typhoon’s access could severely hinder state-level cybersecurity partners’ ability to defend US critical infrastructure in the event of a crisis or conflict. National Guard units in many states are integral to threat intelligence sharing and cyber defense services, meaning a compromise of their networks provides adversaries with crucial insights into the nation’s defensive posture, including personally identifiable information (PII) and work locations of cybersecurity personnel.

The hackers gained initial access by exploiting known vulnerabilities in Cisco and Palo Alto Networks edge devices. Specific vulnerabilities leveraged include CVE-2018-0171, CVE-2023-20198, CVE-2023-20273, and CVE-2024-3400. Beyond the National Guard, Salt Typhoon also stole 1,462 network configuration files from approximately 70 US government and critical infrastructure entities across 12 sectors, including energy, communication, transportation, and water and wastewater, between January 2023 and March 2024.

This incident underscores the ongoing and evolving threat posed by state-sponsored cyber actors to national security. The depth and breadth of Salt Typhoon’s access, coupled with their previous targeting of telecommunications and critical infrastructure, suggest a strategic effort to gather intelligence and potentially pre-position for disruptive actions. The DoD’s findings emphasize the urgent need for enhanced cybersecurity measures and vigilance across all levels of government and critical sectors to counter such persistent and sophisticated threats.

Reference:

  • China’s “Salt Typhoon” cyberattack successfully breached US National Guard systems, raising security concerns.
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

UK Police Arrest Two Scattered Spider Teens

UK Police Arrest Two Scattered Spider Teens

September 19, 2025
UK Police Arrest Two Scattered Spider Teens

Gold Salem Warlock Joins Ransomware

September 19, 2025
UK Police Arrest Two Scattered Spider Teens

Netskope Raises Over 908 Million

September 19, 2025
Glilot Capital Raises 500 Million Fund

Glilot Capital Raises 500 Million Fund

September 18, 2025
Glilot Capital Raises 500 Million Fund

Researchers Uncover Ransomware Links

September 18, 2025
Glilot Capital Raises 500 Million Fund

DOJ Resentences BreachForums Founder

September 18, 2025

Latest Alerts

Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

SEO Poisoning Hits Chinese Users

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

Subscribe to our newsletter

    Latest Incidents

    Russian Hackers Hit Polish Hospitals

    New York Blood Center Data Breach

    Tiffany Data Breach Hits Thousands

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial