On-Prem

Networks

China's Salt Typhoon cyber spies are deep inside US ISPs

Expecting a longer storm season this year?


Updated Another Beijing-linked cyberspy crew, this one dubbed Salt Typhoon, has reportedly been spotted on networks belonging to US internet service providers in stealthy data-stealing missions and potential preparation for future cyberattacks.

The Wall Street Journal on Wednesday reported the breaches, citing "people familiar with the matter." The newspaper didn't name the compromised ISPs, but said "a handful" had been broken into by this new Chinese group that investigators are calling Salt Typhoon.

While the US Cybersecurity and Infrastructure Security Agency did not immediately respond to The Register's inquiries about Salt Typhoon and the alleged ISP break-ins, the news follows a series of similar network intrusions that the Feds and private researchers have tied to Chinese government snoops.

A week ago, FBI Director Christopher Wray revealed his agency and international law enforcement disrupted a 260,000-device botnet controlled by a different Beijing-linked goon squad: Flax Typhoon.

This group had been building the Mirai-based botnet since 2021, and most recently targeting US critical infrastructure, government, and academics, according to Wray. 

Typhoon season hits

In a related security advisory, government agencies accused the Flax Typhoon crew of amassing a SQL database containing details of 1.2 million records on compromised and hijacked devices that they had either previously used or were currently using for the botnet.

As recently as August, another Typhoon gang — Volt Typhoon — was accused of hiding in American networks after exploiting a high-severity bug in Versa's SD-WAN software.

Back in February, the US government confirmed that this same Chinese crew comprised "multiple" US critical infrastructure orgs' IT networks in America in preparation for "disruptive or destructive cyberattacks" against those targets.

Also last week, Binary Defense revealed details of how it uncovered Chinese state-sponsored spies inside a global engineering firm's network where they had been snooping around for four months.

The infosec shop's Director of Security Research John Dwyer spoke exclusively to The Register about the intrusion, which he said has been attributed to an unnamed People's Republic of China team, whose motivation appeared to be espionage and blueprint theft. 

"I can't really comment on the connection between the incidents, but I can say that given the uptick in Chinese-linked attacks against critical infrastructure supply chains, ISPs, and core internet devices there is a clear strategy at play where attackers are aiming to identity and exploit logical choke points in our society to take control of the flow of information and supplies," he told The Register today when asked about a possible Salt Typhoon connection.

Terry Dunlap, a former US National Security Agency offensive analyst, told The Register that while he doesn't have direct knowledge of the most recent cyber intrusion, "it makes sense for US adversaries to target ISPs due to the large volume and variety of comms moving in and out of ISPs."

"Supply chain infiltration by our adversaries has been a problem I've seen since 2010, specifically with Chinese security cameras and other embedded IoT devices," added Dunlap, chief security strategist at IoT security company NetRise.

And, he noted, it should have been spotted earlier. "Why did it take so long for people to discover this? I've known this type of behavior has been happening for years. Why is the US just now waking up to this long established trend in adversarial TTPs?" Those being tactics, techniques, and procedures.

The Salt Typhoon report "is another example of our adversaries embedding themselves deep within the US infrastructure," Dunlap said. "I believe this is another component of China's 100-Year Strategy."®

Updated to add at 0210 UTC, September 26

CISA Executive Assistant Director for Cybersecurity Jeff Greene told us the agency is aware of the report of the compromised ISPs, and said that China is known to be infiltrating all manner of critical targets.

"CISA and our partners continue to emphasize the risk posed by PRC state-sponsored cyber actors, who have compromised the IT environments across multiple critical infrastructure sectors and organizations," he said in a statement.

"We encourage all organizations to review our latest advisories and guidance, to include our joint Cybersecurity Advisory on identifying and mitigating living off the land techniques, and take action, as appropriate."

Send us news
4 Comments

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

More victims of China's Salt Typhoon crew emerge: Telcos just now hit via Cisco bugs

Networks in US and beyond compromised by Beijing's super-snoops pulling off priv-esc attacks

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew