A shadow war is raging in the digital infrastructure we rely on every day, and most people don’t even know it. A state-backed Chinese hacking group known as Salt Typhoon has been quietly targeting telecom companies around the globe. If you use the internet, mobile phone services, or satellite communications, their actions are almost certainly affecting you.
Let’s break this down in plain English.
Think of your internet provider as a digital highway. Every video call, bank transaction, or text message is a car on that road. You expect toll booths and speed traps to be run by authorities who are there to protect you. But what if someone took over the whole highway, rerouted your traffic, spied on your route, or planted hidden devices along the way?
That’s exactly what Salt Typhoon has been doing.
Since 2023, Salt Typhoon has been exploiting old vulnerabilities, especially in Cisco routers, to break into the networks of major telecom companies like Viasat, as well as critical infrastructure in the U.S. and Canada. These routers, often left unpatched for years, become easy gateways when combined with stolen admin credentials.
In 2024, Salt Typhoon infiltrated a U.S. National Guard network, remaining undetected for nine months. In that time, they exfiltrated military plans, personnel files, and troop movement data. They also hit Viasat’s satellite infrastructure, siphoning off call logs, geolocation data, and internal emails, potentially disrupting emergency and military communications in the process.
Canada became the first confirmed non-U.S. victim, as the group breached telecom networks there, again through compromised Cisco devices. They redirected traffic to steal customer information, including billing records and browsing histories.
Salt Typhoon’s methods are alarmingly effective:
Phishing emails lure employees to click on malicious links.
Fake VPN login pages mimic corporate portals to steal credentials.
Custom malware, like GhostStream, hides in plain sight to monitor or extract data.
Router log tampering helps them erase their digital footprints.
They’ve already targeted over 70 U.S. entities, spanning government, telecom, and critical infrastructure like power grids. Once inside, they spread laterally, using weak passwords and outdated software to access more systems. Even when detected, they often return, thanks to planted secondary backdoors and stolen security keys.
If you use a phone, make work calls, or access your bank online, you’re at risk. A successful breach could lead to:
Exposed private conversations
Redirected connections to fake sites
Stolen passwords or client information
This isn’t just a national security issue; it’s a personal one.
At CyberStreams, we’re committed to protecting the digital roads you travel. Here are three proactive steps you can take today:
Use Encrypted Connections
Always use a VPN to keep your data secure, even from your own internet provider.
Monitor Network Traffic
Watch for unusual behavior on your network. Our Managed Network Appliances and SOC services detect and respond to intrusions in real-time.
Train Your Team on Phishing
Human error is still the #1 attack vector. Our 2-minute micro-trainings and regular cyber awareness newsletters keep your staff informed and alert.
Salt Typhoon isn’t just hacking telecoms, they’re rewriting the rules of digital warfare. They hide in the systems we trust most, stealing not just data but control. And while their targets may seem far away, military networks, satellite providers, or telecom giants, the ripple effects hit all of us.
Staying ahead requires constant vigilance, modern tools, and informed people. You don’t need to be a cyber expert to stay safe, but you do need to act.
At CyberStreams, we’re here to help you do just that.
Hire us to set your IT strategy up for sustainable success.
Learn about our proven No-Nonsense approach.
Get an IT roadmap designed specifically for you.
Fearlessly grow your business.