Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

Posted on August 28, 2025August 28, 2025 By CWS

The China-linked superior persistent menace (APT) actor referred to as Salt Storm has continued its assaults focusing on networks the world over, together with organizations within the telecommunications, authorities, transportation, lodging, and army infrastructure sectors.
“Whereas these actors deal with massive spine routers of main telecommunications suppliers, in addition to supplier edge (PE) and buyer edge (CE) routers, additionally they leverage compromised gadgets and trusted connections to pivot into different networks,” in accordance with a joint cybersecurity advisory revealed Wednesday. “These actors usually modify routers to take care of persistent, long-term entry to networks.”
The bulletin, courtesy of authorities from 13 international locations, mentioned the malicious exercise has been linked to a few Chinese language entities, Sichuan Juxinhe Community Expertise Co., Ltd., Beijing Huanyu Tianqiong Info Expertise Co., Ltd., and Sichuan Zhixin Ruijie Community Expertise Co., Ltd.

These firms, the companies mentioned, present cyber-related services to China’s intelligence companies, with the information stolen from the intrusions, particularly these in opposition to telecoms and Web service suppliers (ISPs), offering Beijing with the flexibility to establish and monitor their targets’ communications and actions globally.
Brett Leatherman, head of the U.S. Federal Bureau of Investigation’s Cyber Division, mentioned the Salt Storm has been energetic since not less than 2019, partaking in a persistent espionage marketing campaign aimed toward “breaching international telecommunications privateness and safety norms.”
In a standalone alert issued right this moment, Dutch intelligence and safety companies MIVD and AIVD mentioned whereas organizations within the nation “didn’t obtain the identical diploma of consideration from the Salt Storm hackers as these within the U.S.,” the menace actors gained entry to routers of smaller ISPs and internet hosting suppliers. Nevertheless, there isn’t a proof the hackers penetrated these networks additional.
The international locations which have co-sealed the safety advisory embody Australia, Canada, the Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, New Zealand, Poland, Spain, the U.Okay., and the U.S.
“Since not less than 2021, this exercise has focused organisations in essential sectors together with authorities, telecommunications, transportation, lodging, and army infrastructure globally, with a cluster of exercise noticed within the U.Okay.,” the Nationwide Cyber Safety Centre mentioned.
Based on The Wall Avenue Journal and The Washington Submit, the hacking crew has expanded its focusing on focus to different sectors and areas, attacking a minimum of 600 organizations, together with 200 within the U.S., and 80 international locations.

Salt Storm, which overlaps with exercise tracked as GhostEmperor, Operator Panda, RedMike, and UNC5807, has been noticed acquiring preliminary entry by the exploitation of uncovered community edge gadgets from Cisco (CVE-2018-0171, CVE-2023-20198, and CVE-2023-20273), Ivanti (CVE-2023-46805 and CVE-2024-21887), and Palo Alto Networks (CVE-2024-3400).
“The APT actors could goal edge gadgets no matter who owns a selected system,” the companies famous. “Units owned by entities that don’t align with the actors’ core targets of curiosity nonetheless current alternatives to be used in assault pathways into targets of curiosity.”
The compromised gadgets are then leveraged to pivot into different networks, in some circumstances even modifying the system’s configuration and including a generic routing encapsulation (GRE) tunnel for persistent entry and knowledge exfiltration.
Persistent entry to focus on networks is completed by altering Entry Management Lists (ACLs) so as to add IP addresses beneath their management, opening commonplace and non-standard ports, and working instructions in an on-box Linux container on supported Cisco networking gadgets to stage instruments, course of knowledge regionally, and transfer laterally throughout the surroundings.
Additionally put to make use of by the attackers are authentication protocols like Terminal Entry Controller Entry Management System Plus (TACACS+) to allow lateral motion throughout community gadgets, whereas concurrently conducting intensive discovery actions and capturing community visitors containing credentials by way of compromised routers to burrow deeper into the networks.

“The APT actors collected PCAPs utilizing native tooling on the compromised system, with the first goal seemingly being to seize TACACS+ visitors over TCP port 49,” the companies mentioned. “TACACS+ visitors is used for authentication, usually for administration of community gear and together with extremely privileged community directors’ accounts and credentials, seemingly enabling the actors to compromise extra accounts and carry out lateral motion.”

On high of that, Salt Storm has been noticed enabling the sshd_operns service on Cisco IOS XR gadgets to create a neighborhood person and grant it sudo privileges to acquire root on the host OS after logging in by way of TCP/57722.
Google-owned Mandiant, which was one of many many trade companions that contributed to the advisory, said the menace actor’s familiarity with telecommunications programs gives them a novel benefit, giving them an higher hand with regards to protection evasion.
“An ecosystem of contractors, teachers, and different facilitators is on the coronary heart of Chinese language cyber espionage,” John Hultquist, Chief Analyst at Google Risk Intelligence Group, advised The Hacker Information. Contractors are used to construct instruments and priceless exploits in addition to perform the soiled work of intrusion operations. They’ve been instrumental within the fast evolution of those operations and rising them to an unprecedented scale.”
“Along with focusing on telecommunications, reported focusing on of hospitality and transportation by this actor could possibly be used to intently surveil people. Info from these sectors can be utilized to develop a full image of who somebody is speaking to, the place they’re, and the place they’re going.”

The Hacker News Tags:Alto, Breach, Cisco, Exploits, Flaws, Ivanti, Organizations, Palo, Salt, Typhoon, Worldwide

Post navigation

Previous Post: China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years
Next Post: Nevada IT Systems Hit by Cyberattack

Related Posts

Why DNS Security Is Your First Defense Against Cyber Attacks? The Hacker News
Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore The Hacker News
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App The Hacker News
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
  • Nevada IT Systems Hit by Cyberattack
  • Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide
  • China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years
  • FreePBX Servers Hacked in 0-day Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
  • Nevada IT Systems Hit by Cyberattack
  • Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide
  • China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years
  • FreePBX Servers Hacked in 0-day Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News