Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Summary: Suggested Corrections:
Salt Typhoon is identified by the United States Cybersecurity and Infrastructure Security Agency (CISA) as a state-sponsored threat actor that has successfully compromised at least nine telecommunications companies with headquarters in the United States, thus prioritizing government and political figures and very high-profile targets. Salt Typhoon, the APT group more commonly known by a variety of monikers like FamousSparrow, GhostEmperor, Earth Estries, or UNC2286 across previously published sources, is believed to be involved in espionage, with a particular focus on the telecommunications, government, and technology sectors across the globe. This advanced persistent threat (APT) group is recognized for using a combination of known vulnerabilities, including Microsoft’s ProxyLogon (CVE-2021-26855) and Ivanti's Connect Secure vulnerabilities (CVE-2023-46805 and CVE-2024-21887), in order to secure an initial foothold into a target. Their activities have resulted in major breaches to critical U.S. infrastructure and communication networks affecting their national security.
Security Officer Comments:
Salt Typhoon operated as a potent reminder that many telecom infrastructures should be insulated against continuous sabotage by state-backed attackers. By exploiting known security flaws and zero-day vulnerabilities, Salt Typhoon has signaled for immediate patching and increased vigilance across sectors handling sensitive political and governmental data. Many vulnerabilities actively exploited are characterized internationally by an insufficiently proactive defensive stance, with dozens of companies hosting such security shortcomings even when a patch is issued. This irregularity in patching creates a very fertile ground from which comes this prolonged, stealthy, really sophisticated campaign able to conduct long-term espionage, namely a state-level actor.
MITRE ATT&CK Techniques Used by Salt Typhoon:
To lessen the risk presented by Salt Typhoon and other APT groups, organizations should take the following steps:
Patch Management: Ensure extremely fast patching for all known vulnerabilities, including those affecting Microsoft Exchange (ProxyLogon), Ivanti Connect Secure, and Fortinet FortiClientEMS. As the group uses known CVEs, applying late patches should be one of the top priorities.
Zero-Day Detection and Prevention: The IDS must prevent zero-day exploitation - for that, detection tools should look for suspicious activity and include mitigative actions until patches become available.
Network Segmentation and Monitoring: In light of limiting the spread of an attack, ensure the segmentation of sensitive and critical systems from the rest of the network. This includes enhancing monitoring for unusual behavior or unauthorized access across networks and endpoints.
End-to-End Encryption: Encryption of communications should be performable end to end, especially for sensitive governmental and political figures to counter eavesdropping or interception.
Hardening of Security: Follow CISA guidance on securing Cisco devices. Some services, like Smart Install, are subject to abuse. Ensure that all internet-facing devices are securely configured with the least operating privileges.
Ongoing Threat Intelligence and Training: Continuous updates of threat intelligence feeds within the organization regarding TCP-based attack types utilized in bursts by sponsored actors. Additionally, members of staff should receive training on how to recognize phishing attempts and suspicious activity.
Link(s):
https://www.tenable.com/blog/salt-t...ities-exploited-by-this-state-sponsored-actor