Salt Typhoon APT Subverts Law Enforcement Wiretapping: Report

Share This Post

The Chinese state-sponsored advanced persistent threat (APT) known as Salt Typhoon appears to have accessed major US broadband provider networks by hacking into the systems that law-enforcement agencies use for court-authorized wiretapping.

According to unnamed sources speaking to the Wall Street Journal, the affected providers include major national players like AT&T and Verizon Communications, along with enterprise-specific service providers like Lumen Technologies.

In addition to the wiretapping connections, the sources said Salt Typhoon also had access to more general Internet traffic flowing through the provider networks, and that the cyberattackers went after a handful of targets outside the US as well. The APT could have had access for months, they added.

“The widespread compromise is considered a potentially catastrophic security breach and was carried out by a sophisticated Chinese hacking group dubbed Salt Typhoon,” sources told the WSJ. “It appeared to be geared toward intelligence collection.”

Neither AT&T, Lumen, or Verizon immediately responded to a request for comment from Dark Reading.

Lawful Intercept Connections in China’s Hacking Sights

The news comes about a week after Salt Typhoon was outed as hacking into major telecom networks for cyber-espionage purposes, and possibly to position itself to disrupt communications in the event of a kinetic conflict between China and the US. But the subversion of the connections that law enforcement entities have to service provider networks (which they can use to intercept communications of private individuals or organizations during criminal investigations or for purposes of national security) is a new wrinkle.

No information is available on how the attackers might have gotten access to the lawful intercept infrastructure, but Ram Elboim, CEO of Sygnia, which tracks the APT as “GhostEmperor,” notes that clearly Salt Typhoon performed extensive reconnaissance.

“Reaching and compromising these sensitive assets requires not only familiarity with the network structure, but also advanced capabilities to be able to move laterally across separated sub-networks,” he tells Dark Reading. “One assumes that these assets are far separated from the ISP corporate and operational network, and also connected to law enforcements’ networks in order for authorities to be able to operate and stream the gathered data in a very secure method.”

This breach demonstrates the need for critical infrastructure organizations to not only design their network structure securely with strict segregation strategies, but to “continuously update and test the resilience of their operational networks and sensitive assets as part of a robust incident response playbook,” he adds.

https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd061ec80dc73e0b0/6704385cf8caa76387414140/salt-Miro_Novak-Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.