
Inside Salt Typhoon’s Hacks, While They’re Inside Our Telecoms
A shadow war is raging in the digital infrastructure we rely on every day, and most people don’t even know it. A state-backed Chinese hacking group known as Salt Typhoon has been quietly targeting telecom companies around the globe. If you use the internet, mobile phone services, or satellite communications, their actions are almost certainly affecting you.
Let’s break this down in plain English.
The Highway of Your Data, Now Under Siege
Think of your internet provider as a digital highway. Every video call, bank transaction, or text message is a car on that road. You expect toll booths and speed traps to be run by authorities who are there to protect you. But what if someone took over the whole highway, rerouted your traffic, spied on your route, or planted hidden devices along the way?
That’s exactly what Salt Typhoon has been doing.
The Tactics: Old Flaws, New Threats
Since 2023, Salt Typhoon has been exploiting old vulnerabilities, especially in Cisco routers, to break into the networks of major telecom companies like Viasat, as well as critical infrastructure in the U.S. and Canada. These routers, often left unpatched for years, become easy gateways when combined with stolen admin credentials.
In 2024, Salt Typhoon infiltrated a U.S. National Guard network, remaining undetected for nine months. In that time, they exfiltrated military plans, personnel files, and troop movement data. They also hit Viasat’s satellite infrastructure, siphoning off call logs, geolocation data, and internal emails, potentially disrupting emergency and military communications in the process.
Canada Isn’t Immune
Canada became the first confirmed non-U.S. victim, as the group breached telecom networks there, again through compromised Cisco devices. They redirected traffic to steal customer information, including billing records and browsing histories.
The Playbook: Phishing, Malware, and Persistence
Salt Typhoon’s methods are alarmingly effective:
Phishing emails lure employees to click on malicious links.
Fake VPN login pages mimic corporate portals to steal credentials.
Custom malware, like GhostStream, hides in plain sight to monitor or extract data.
Router log tampering helps them erase their digital footprints.
They’ve already targeted over 70 U.S. entities, spanning government, telecom, and critical infrastructure like power grids. Once inside, they spread laterally, using weak passwords and outdated software to access more systems. Even when detected, they often return, thanks to planted secondary backdoors and stolen security keys.
Why It Matters to You
If you use a phone, make work calls, or access your bank online, you’re at risk. A successful breach could lead to:
Exposed private conversations
Redirected connections to fake sites
Stolen passwords or client information
This isn’t just a national security issue; it’s a personal one.
What You Can Do: Three Key Steps
At CyberStreams, we’re committed to protecting the digital roads you travel. Here are three proactive steps you can take today:
Use Encrypted Connections
Always use a VPN to keep your data secure, even from your own internet provider.Monitor Network Traffic
Watch for unusual behavior on your network. Our Managed Network Appliances and SOC services detect and respond to intrusions in real-time.Train Your Team on Phishing
Human error is still the #1 attack vector. Our 2-minute micro-trainings and regular cyber awareness newsletters keep your staff informed and alert.
Conclusion: This War Is Silent, But the Damage Isn’t
Salt Typhoon isn’t just hacking telecoms, they’re rewriting the rules of digital warfare. They hide in the systems we trust most, stealing not just data but control. And while their targets may seem far away, military networks, satellite providers, or telecom giants, the ripple effects hit all of us.
Staying ahead requires constant vigilance, modern tools, and informed people. You don’t need to be a cyber expert to stay safe, but you do need to act.
At CyberStreams, we’re here to help you do just that.