Press ESC to close

Dark Web Profile: Salt Typhoon

Category Details
Threat Actors Salt Typhoon (aka GhostEmperor, FamousSparrow, UNC2286); linked to Chinese Ministry of State Security.
Campaign Overview Focus on telecom and broadband networks, targeting call metadata, wiretap communications, and sensitive data in North America and Southeast Asia; linked to high-profile attacks on political figures during U.S. elections.
Target Regions North America, Southeast Asia, Middle East.
Methodology Exploiting zero-day vulnerabilities, Windows kernel-mode rootkits (e.g., Demodex), metadata interception, exploiting backend telecom systems.
Product Targeted Telecom and broadband infrastructure, cloud services, Exchange servers, court-authorized wiretap systems.
Malware Reference Demodex rootkit, GhostEmperor malware framework, custom loaders.
Tools Used PsExec, WMI, PowerShell scripts, side-loaded DLLs, obfuscation/encryption techniques.
Vulnerabilities Exploited ProxyLogon, public-facing server vulnerabilities, configuration flaws in telecom systems.
TTPs Persistence via kernel-mode malware, spear-phishing, lateral movement using remote services, obfuscated malware, and data collection from local systems and clipboard.
Attribution Tied to Chinese APTs; disclosed by Wall Street Journal in September 2024.
Recommendations Network segmentation, patch management, Zero Trust architecture, threat intelligence, CISA’s telecom security guidelines (e.g., reducing exposure, advanced segmentation, out-of-band management networks).
Source SOCRadar

Read full article: https://socradar.io/dark-web-profile-salt-typhoon/

The above summary has been generated by an AI language model

Source: SOCRadar

Published on: December 12, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *