Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Salt Typhoon Intensifies Attacks on Global Telecoms via Cisco Routers
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Salt Typhoon Intensifies Attacks on Global Telecoms via Cisco Routers

Highlights

  • Salt Typhoon continues to target global telecoms using Cisco router exploits.

  • The group has compromised networks in over 100 countries since December.

  • Enhanced security measures are crucial to counteract these persistent threats.

Samantha Reed
Last updated: 13 February, 2025 - 10:19 pm 10:19 pm
Samantha Reed 3 months ago
Share
SHARE

Salt Typhoon, a Chinese nation-state threat group, continues its persistent campaign against global telecom providers by targeting Cisco network routers. The group’s ongoing activities highlight persistent vulnerabilities within telecom infrastructures, raising concerns among cybersecurity experts worldwide. Recorded Future’s latest report reveals that Salt Typhoon has compromised multiple networks across more than 100 countries, demonstrating the group’s expansive reach and sophisticated attack methods.

Contents
How Did Salt Typhoon Exploit Cisco Devices?Which Telecom Networks Were Hit?What Are the Implications for Global Cybersecurity?

Salt Typhoon has a history of targeting critical infrastructure, but recent activities indicate an escalation in both scale and sophistication. Previous incidents involved attacks on major providers, but the latest wave shows a broader geographic spread and the exploitation of newly identified vulnerabilities in Cisco devices. This expansion suggests that Salt Typhoon is adapting its strategies to overcome existing security measures.

How Did Salt Typhoon Exploit Cisco Devices?

The group exploited two known privilege escalation vulnerabilities in Cisco IOS XE, namely CVE-2023-20198 and CVE-2023-20273. By first creating a local user through CVE-2023-20198, they gained initial access, which was then escalated to root privileges using CVE-2023-20273.

“We have not observed other initial access vectors related to this campaign at this time,”

stated Jon Condra, senior director of strategic intelligence at Recorded Future.

Which Telecom Networks Were Hit?

Recorded Future identified seven compromised Cisco network devices across five telecom networks, including an unnamed U.S. internet service provider and telecom company, a U.S.-based affiliate of a U.K. telecom provider, a large telecom provider in Thailand, an Italy-based ISP, and a South Africa-based telecom provider. Additionally, universities in nine countries were targeted, possibly indicating an interest in research related to telecom, engineering, and technology.

What Are the Implications for Global Cybersecurity?

The continued attacks by Salt Typhoon underline the challenges faced by global cyber authorities in securing critical infrastructure. The exploitation of widely used Cisco devices by a state-sponsored group emphasizes the need for robust security measures and timely patch management. Cisco has urged customers to upgrade to fixed software releases to mitigate these vulnerabilities.

Addressing these threats requires a coordinated international response and enhanced security protocols within telecom networks. Organizations must prioritize the implementation of Cisco’s hardening guides for NX-OS and IOS-XE devices to prevent further intrusions. Continuous monitoring and proactive vulnerability management are essential to safeguard against persistent threats like Salt Typhoon.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Avowed Enables Quick Camera Switching for Players
Next Article Topcon and Bonsai Robotics Collaborate on Farm Automation

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
Nvidia Faces Price Uncertainty Despite Tariff Agreement
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?