Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

China’s Salt Typhoon Hacked US Guard

July 16, 2025
Reading Time: 3 mins read
in News
Google Realeases Critical Chrome Update

A recent Department of Defense (DoD) report has revealed that “Salt Typhoon,” a Chinese state-sponsored hacking group, successfully breached the network of a US Army National Guard unit. This extensive compromise, active from March to December 2024, allowed the threat actors to collect sensitive configuration information and eavesdrop on communications with other units across every US state and at least four US territories. The stolen data included administrator credentials and network diagrams, providing a significant advantage for potential follow-on attacks against other National Guard entities and their interconnected systems.

The group, known for its persistent and sophisticated cyber espionage campaigns, has a documented history of targeting critical infrastructure.

Previously, Salt Typhoon was implicated in hacking major US telecommunications giants like AT&T, Verizon, and Lumen Technologies, specifically compromising wiretap systems. More recently, Canadian authorities and the FBI issued warnings about the group’s targeting of Canadian telecom providers to steal call records and private communications, demonstrating a consistent focus on communication networks and sensitive data.

The implications of the National Guard breach are particularly concerning. The DoD report highlights that Salt Typhoon’s access could severely hinder state-level cybersecurity partners’ ability to defend US critical infrastructure in the event of a crisis or conflict. National Guard units in many states are integral to threat intelligence sharing and cyber defense services, meaning a compromise of their networks provides adversaries with crucial insights into the nation’s defensive posture, including personally identifiable information (PII) and work locations of cybersecurity personnel.

The hackers gained initial access by exploiting known vulnerabilities in Cisco and Palo Alto Networks edge devices. Specific vulnerabilities leveraged include CVE-2018-0171, CVE-2023-20198, CVE-2023-20273, and CVE-2024-3400. Beyond the National Guard, Salt Typhoon also stole 1,462 network configuration files from approximately 70 US government and critical infrastructure entities across 12 sectors, including energy, communication, transportation, and water and wastewater, between January 2023 and March 2024.

This incident underscores the ongoing and evolving threat posed by state-sponsored cyber actors to national security. The depth and breadth of Salt Typhoon’s access, coupled with their previous targeting of telecommunications and critical infrastructure, suggest a strategic effort to gather intelligence and potentially pre-position for disruptive actions. The DoD’s findings emphasize the urgent need for enhanced cybersecurity measures and vigilance across all levels of government and critical sectors to counter such persistent and sophisticated threats.

Reference:

  • China’s “Salt Typhoon” cyberattack successfully breached US National Guard systems, raising security concerns.
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

New Malware Pushes Cybercrime Limits

NIST Issues Lightweight Crypto Standard

August 25, 2025
New Malware Pushes Cybercrime Limits

FTC Warns Big Tech on Encryption

August 25, 2025
New Malware Pushes Cybercrime Limits

New Malware Pushes Cybercrime Limits

August 25, 2025
INTERPOL Nabs 1,209 Cybercriminals

INTERPOL Nabs 1,209 Cybercriminals

August 22, 2025
INTERPOL Nabs 1,209 Cybercriminals

Ex-Dev Jailed for Employer Malware Hit

August 22, 2025
INTERPOL Nabs 1,209 Cybercriminals

Microsoft Halts PoC Sharing with China

August 22, 2025

Latest Alerts

Tableau Server Flaw Enables Uploads

Fakes Android Antivirus Has Malware

Fake Go SSH Tool Steals Credentials

Apple Patches New Zero-Day Exploit

FBI Warns FSB Hackers Exploit Cisco Flaws

Chinese Hackers Boost Cloud Espionage

Subscribe to our newsletter

    Latest Incidents

    Hackers Hijack Russian TV Broadcast

    Data I O Halts Systems After Attack

    Grok Chat Data Exposed via Google

    DaVita Data Breach Hits 2.7M People

    Qilin Gang Hits Nissan CBI with Breach

    Microsoft Probes Copilot, Office Outage

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial