The Salt Typhoon cyberattack, linked to Chinese government-backed hackers, continues to target American telecommunications companies. Recent reports have revealed that additional firms, including Charter Communications, Consolidated Communications, and Windstream, have fallen victim to this cyber espionage campaign, which was previously known to involve major carriers like AT&T, Verizon, and Lumen Technologies. The U.S. government has condemned this ongoing operation, which is part of a broader effort by China to infiltrate critical infrastructure across the United States.
The scope of the Salt Typhoon attack is expanding, as the White House confirmed at least nine American companies have been breached. While the Wall Street Journal added new victims to the list, including T-Mobile, the company denied being one of the nine directly referenced by the U.S. government. The ongoing investigation into these breaches is focused on understanding the full extent of the cyberattack and its potential long-term consequences.
One of the most concerning aspects of the Salt Typhoon cyberattack is the use of unpatched vulnerabilities in widely used network devices by Fortinet and Cisco. In some instances, the attackers gained access to high-level management accounts that lacked multi-factor authentication, allowing them to infiltrate critical networks. This breach reportedly enabled the intruders to access over 100,000 routers, and there are concerns that they may have copied sensitive traffic and erased evidence of their activities to avoid detection.
The Salt Typhoon operation is part of a larger pattern of Chinese state-sponsored cyber activities aimed at compromising both public and private sector networks in the U.S. Prior incidents, such as the Volt Typhoon campaign, also targeted Cisco routers to infiltrate vital infrastructure, including energy, water, and manufacturing facilities. The exploitation of these devices highlights the persistent vulnerability of network management systems and underscores the need for stronger cybersecurity measures to protect against state-sponsored cyber threats.