Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China’s Salt Typhoon Hackers Target Canadian Telecom Firms

China’s Salt Typhoon Hackers Target Canadian Telecom Firms

Posted on June 23, 2025June 23, 2025 By CWS

The Canadian Centre for Cyber Safety and the FBI have issued a warning over hacker assaults performed by Chinese language state-sponsored risk actors in opposition to telecommunication firms in Canada.

The warning focuses on assaults performed by Salt Hurricane, the risk group recognized for focusing on a number of main telecom corporations in the USA and elsewhere as a part of espionage operations.

In some circumstances, the hackers managed to steal name information and personal communications belonging to helpful targets, together with authorities staff and political figures. 

The Canadian cybersecurity company stated it’s conscious of current assaults doubtless performed by Salt Hurricane in opposition to telecommunication organizations within the nation. 

“Three community units registered to a Canadian telecommunications firm have been compromised by doubtless Salt Hurricane actors in mid-February 2025,” the Canadian Centre for Cyber Safety stated. 

“The actors exploited CVE-2023-20198 to retrieve the working configuration recordsdata from all three units and modified no less than one of many recordsdata to configure a GRE tunnel, enabling site visitors assortment from the community,” it added.

CVE-2023-20198 is a Cisco gadget vulnerability that has additionally been exploited by Salt Hurricane to hack into the networks of US telcos. 

The Canadian company additionally identified that separate investigations discovered proof of Salt Hurricane assaults geared toward entities outdoors of the telecom sector.Commercial. Scroll to proceed studying.

“Focusing on of Canadian units could permit the risk actors to gather info from the sufferer’s inside community, or use the sufferer’s gadget to allow the compromise of additional victims. In some circumstances, we assess that the risk actors’ actions have been very doubtless restricted to community reconnaissance,” the company stated. 

US communications firm Viasat is the most recent to verify being focused by Salt Hurricane. Viasat stated it had detected unauthorized entry via a compromised gadget, however discovered no proof of impression to clients. 

Whereas a number of of Salt Hurricane’s victims within the US are recognized, it’s unclear which telcos have been focused in Canada. 

Associated: Cisco Particulars ‘Salt Hurricane’ Community Hopping, Credential Theft Ways

Associated: China’s Secret Weapon? How EV Batteries May Be Weaponized to Disrupt America

Associated: Man Helped People in China Get Jobs Involving Delicate US Authorities Tasks

Security Week News Tags:Canadian, Chinas, Firms, Hackers, Salt, Target, Telecom, Typhoon

Post navigation

Previous Post: Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails
Next Post: Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support

Related Posts

Helmet Security Emerges From Stealth Mode With  Million in Funding Helmet Security Emerges From Stealth Mode With $9 Million in Funding Security Week News
Chinese Cyberspies Hacked US Defense Contractors Chinese Cyberspies Hacked US Defense Contractors Security Week News
Lumma Stealer Activity Drops After Doxxing Lumma Stealer Activity Drops After Doxxing Security Week News
Microsoft Reduces Israel’s Access to Cloud and AI Products Over Reports of Mass Surveillance in Gaza Microsoft Reduces Israel’s Access to Cloud and AI Products Over Reports of Mass Surveillance in Gaza Security Week News
Facial Recognition’s Trust Problem – SecurityWeek Facial Recognition’s Trust Problem – SecurityWeek Security Week News
Why Scamming Can’t Be Stopped—But It Can Be Managed Why Scamming Can’t Be Stopped—But It Can Be Managed Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News