Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage

45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage

Posted on September 9, 2025September 9, 2025 By CWS

Sep 09, 2025Ravie LakshmananCyber Espionage / Telecom Safety
Risk hunters have found a set of beforehand unreported domains, some going again to Might 2020, which are related to China-linked risk actors Salt Hurricane and UNC4841.
“The domains date again a number of years, with the oldest registration exercise occurring in Might 2020, additional confirming that the 2024 Salt Hurricane assaults weren’t the primary exercise carried out by this group,” Silent Push mentioned in a brand new evaluation shared with The Hacker Information.
The recognized infrastructure, totaling 45 domains, has additionally been recognized as sharing some stage of overlap with one other China-associated hacking group tracked as UNC4841, which is finest recognized for its zero-day exploitation of a safety flaw in Barracuda E-mail Safety Gateway (ESG) home equipment (CVE-2023-2868, CVSS rating: 9.8).
Salt Hurricane, energetic since 2019, drew widespread consideration final yr for its concentrating on of telecommunications companies suppliers within the U.S. Believed to be operated by China’s Ministry of State Safety (MSS), the risk cluster shares similarities with actions tracked as Earth Estries, FamousSparrow, GhostEmperor, and UNC5807.

Silent Push mentioned it recognized three Proton Mail e-mail addresses that have been used to register as many as 16 domains with non-existent addresses.
Additional examination of the IP addresses associated to the 45 domains has revealed that many of those domains pointed to high-density IP addresses. These check with IP addresses to which a excessive variety of hostnames at present level, or have pointed prior to now. Of those who pointed to low-density IP addresses, the earliest exercise goes again to October 2021.
The oldest area recognized as being a part of China-backed cyber espionage campaigns is onlineeylity[.]com, registered on Might 19, 2020, by a pretend persona named Monica Burch, who claims to reside at 1294 Koontz Lane in Los Angeles, California.
“As such, we strongly urge any group that believes itself to be prone to Chinese language espionage to look its DNS logs for the previous 5 years for requests to any of the domains in our archive feed, or their subdomains,” Silent Push mentioned.
“It could even be prudent to verify for requests to any of the listed IP addresses, notably through the time durations wherein this actor operated them.”

The Hacker News Tags:Cyber, Domains, Espionage, Expose, Longstanding, Previously, Salt, Typhoon, Unreported

Post navigation

Previous Post: How to Use Incognito Mode Effectively
Next Post: Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads

Related Posts

Critical Weaver E-cology Flaw Exploited via Debug API Critical Weaver E-cology Flaw Exploited via Debug API The Hacker News
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools The Hacker News
3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches The Hacker News
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users The Hacker News
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware The Hacker News
New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark