Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

Posted on June 24, 2025June 24, 2025 By CWS

Jun 24, 2025Ravie LakshmananCyber Espionage / Chinese language Hackers
The Canadian Centre for Cyber Safety and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber assaults mounted by the China-linked Salt Storm actors to breach main international telecommunications suppliers as a part of a cyber espionage marketing campaign.
The attackers exploited a crucial Cisco IOS XE software program (CVE-2023-20198, CVSS rating: 10.0) to entry configuration recordsdata from three community units registered to a Canadian telecommunications firm in mid-February 2025.

The menace actors are additionally mentioned to have modified a minimum of one of many recordsdata to configure a Generic Routing Encapsulation (GRE) tunnel, enabling visitors assortment from the community. The identify of the focused firm was not disclosed.

Stating that the focusing on possible goes past the telecommunications sector, the businesses mentioned the focusing on of Canadian units could allow the menace actors to gather data from the compromised networks and use them as leverage to breach further units.
“In some circumstances, we assess that the menace actors’ actions have been very possible restricted to community reconnaissance,” per the alert.
The businesses additional identified that edge community units proceed to be a beautiful goal for Chinese language state-sponsored menace actors seeking to breach and keep persistent entry to telecom service suppliers.
The findings dovetail with an earlier report from Recorded Future that detailed the exploitation of CVE-2023-20198 and CVE-2023-20273 to infiltrate telecom and web corporations within the U.S., South Africa, and Italy, and leveraging the footholds to arrange GRE tunnels for long-term entry and information exfiltration.
U.Ok. NCSC Warns of SHOE RACK and UMBRELLA STAND Malware Focusing on Fortinet Units
The event comes because the U.Ok. Nationwide Cyber Safety Centre (NCSC) revealed two totally different malware households dubbed SHOE RACK and UMBRELLA STAND which have been discovered focusing on FortiGate 100D collection firewalls made by Fortinet.

Whereas SHOE RACK is a post-exploitation device for distant shell entry and TCP tunneling by means of a compromised machine, UMBRELLA STAND is designed to run shell instructions issued from an attacker-controlled server.

Apparently, SHOE RACK is partly based mostly on a publicly accessible device named reverse_shell, which, coincidentally, has additionally been repurposed by a China-nexus menace cluster referred to as PurpleHaze to plot a Home windows implant codenamed GoReShell. It is presently not clear if these actions are associated.
The NCSC mentioned it recognized some similarities between UMBRELLA STAND and COATHANGER, a backdoor that was beforehand put to make use of by Chinese language state-backed hackers in a cyber assault geared toward a Dutch armed forces community.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Canadian, ChinaLinked, Cisco, Critical, Exploits, Salt, Target, Telecom, Typhoon, Vulnerability

Post navigation

Previous Post: Notepad++ Vulnerability Let Attacker Gains Complete System Control
Next Post: LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly

Related Posts

Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing The Hacker News
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto The Hacker News
Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News