Salt Typhoon: Unmasking a New Era of Cyber Espionage on Election Day

On November 5, 2024, the day of the U.S. elections, the Wall Street Journal published an article entitled “China Hack Enabled Vast Spying on U.S. Officials, Likely Ensnaring Thousands of Contacts,” which highlights the dangers posed by Advanced Persistent Threats (APTs). APTs represent a significant challenge for national security due to their ability to infiltrate and remain undetected for extended periods. This article sheds light on the increasing sophistication of cyber operations orchestrated by state-sponsored groups, specifically focusing on the activities of the Salt Typhoon group.

TWC Insight: As we navigate a rapidly changing geopolitical landscape, the actions of groups like Salt Typhoon remind us of the vulnerabilities inherent in our digital infrastructure. Understanding these threats is crucial for safeguarding our national security and protecting democratic processes.

Advanced Persistent Threats: The Rise of Salt Typhoon

APTs are characterized by prolonged and targeted attacks, often conducted by well-funded and organized groups seeking to infiltrate networks to gather sensitive information. Salt Typhoon, linked to the Chinese Ministry of State Security, exemplifies an APT employing advanced techniques to penetrate critical infrastructure and gather intelligence from U.S. telecommunications providers.

Salt Typhoon's operations illustrate a broader strategy by the Chinese government to enhance its intelligence capabilities while undermining the security of rival states. Their methodical approach prioritizes long-term infiltration over immediate data theft, allowing them to establish a presence within networks and conduct ongoing intelligence collection.

Notable Campaigns

At present, only two campaigns are known to have been carried out by Salt Typhoon, but both demonstrate their capabilities and intent:

  1. Infiltration of U.S. Internet Service Providers: In September 2024, the group successfully penetrated the networks of U.S. broadband providers, including AT&T, Verizon, and Lumen Technologies. This breach established a foothold within critical infrastructures, from where information was extracted. When discovered, it raised concerns about the potential for espionage and the compromise of sensitive communications.

  2. Exploitation of Wiretap Systems: In October 2024, investigators revealed that Salt Typhoon had exploited vulnerabilities in U.S. ISP networks used by law enforcement for court-authorized wiretapping. This alarming revelation indicated that the group could access sensitive surveillance data, posing a significant threat to national security.

These campaigns highlight the sophistication of Salt Typhoon's tactics, which combine strategic long-term infiltration with the capability for real-time data collection.

Implications of the Breach

The ramifications of Salt Typhoon's campaigns extend far beyond breaches in which people can have access to telecommunication services or wiretap systems (without leaving aside the technical implications to achieve it), because they pose significant threats to national security and democratic integrity. Reports indicate that the hackers captured unencrypted text messages, call logs, and even audio recordings from devices linked to political figures from both the Trump and Harris presidential campaigns. This access provided critical insights into ongoing FBI investigations and the internal communications of key candidates. Such intelligence not only allows adversaries to monitor election activities but also to anticipate U.S. responses to various geopolitical threats, offering a substantial advantage in their espionage efforts.

The Broader Threat Landscape

The tactics employed by Salt Typhoon represent a calculated intent to undermine U.S. national security over time. U.S. lawmakers, including Senator Ron Wyden, have expressed their shock at the extent of these breaches, labeling them among the most serious incidents in recent memory​. The ongoing investigations are expected to reveal more victims, further emphasizing the breadth of Salt Typhoon's cyber campaigns.

What Could China Gain?

As mentioned, China’s operations extend beyond these two known Salt Typhoon campaigns. Experts, including former NSA analyst Terry Dunlap, warn that China is leveraging artificial intelligence to analyze the extensive obtained data through cyber espionage. Notable examples include the 2015 Office of Personnel Management breach, which compromised over 21 million records, and the infamous Microsoft Exchange hack in 2021, affecting tens of thousands of organizations.

Potentially, China is constructing detailed dossiers on thousands of individuals, including U.S. citizens. This capability could enable a more targeted approach to espionage and influence operations, raising significant concerns about privacy and security for Americans.

China's Response to the Allegations

In response to allegations surrounding the hacking incidents, Chinese officials have consistently denied any involvement in cyber espionage, labeling such claims as unfounded and politically motivated; the Chinese government asserts that the United States is the "biggest hacking empire" and accuses it of fabricating stories to deflect attention from its own cyber activities.

In a report released by China's National Computer Virus Emergency Response Center (NCVERC), the agency dismissed U.S. allegations of Chinese cyberattacks as a "political farce," contending that the U.S. has long deployed "cyber warfare forces" for reconnaissance and network penetration.

Moreover, Liu Pengyu, a spokesperson for the Chinese Embassy in Washington, has also denied U.S. hacking allegations, accusing Washington of conducting its own cyberattacks; stating that China "firmly opposes and cracks down on all forms of cyber attacks" and described the accusations as "groundless."

These responses reflect China's consistent stance against the allegations, emphasizing its commitment to combating cybercrime and advocating for international cooperation in cyberspace.

Why This Matters Now

As geopolitical tensions rise, particularly regarding Taiwan and China's military assertiveness, the timing of these breaches is especially concerning. Salt Typhoon's operations are not isolated incidents; they reflect a broader strategy by the Chinese government to consolidate its intelligence capabilities while threatening the security of its rivals.

The Biden administration, and the following U.S. President, faces a critical challenge in responding to this unprecedented cyber threat. With previous strategies failing to mitigate China's aggressive cyber activities, there is an urgent need for a comprehensive re-evaluation of both domestic and international cybersecurity policies.

Final Reflections on Salt Typhoon’s Impact

In a world where digital information flows freely, the stakes have never been higher. The activities of Salt Typhoon serve as a stark reminder of the vulnerabilities inherent in our communications infrastructure and the lengths to which adversaries will go to exploit these weaknesses. As we look to the future, the question remains: what measures will be taken to safeguard our national security against these evolving threats? The answer to this question will define the next chapter in the ongoing battle for cybersecurity.


Previous
Previous

United States vs. Google: The Landmark Antitrust Case of the Decade

Next
Next

(101 Series) The GDPR and What We Don't Realize About Data Protection, or the Importance of Cybersecurity in Our Daily Lives