Category | Details |
---|---|
Threat Actors | Salt Typhoon (aka GhostEmperor, FamousSparrow, UNC2286); linked to Chinese Ministry of State Security. |
Campaign Overview | Focus on telecom and broadband networks, targeting call metadata, wiretap communications, and sensitive data in North America and Southeast Asia; linked to high-profile attacks on political figures during U.S. elections. |
Target Regions | North America, Southeast Asia, Middle East. |
Methodology | Exploiting zero-day vulnerabilities, Windows kernel-mode rootkits (e.g., Demodex), metadata interception, exploiting backend telecom systems. |
Product Targeted | Telecom and broadband infrastructure, cloud services, Exchange servers, court-authorized wiretap systems. |
Malware Reference | Demodex rootkit, GhostEmperor malware framework, custom loaders. |
Tools Used | PsExec, WMI, PowerShell scripts, side-loaded DLLs, obfuscation/encryption techniques. |
Vulnerabilities Exploited | ProxyLogon, public-facing server vulnerabilities, configuration flaws in telecom systems. |
TTPs | Persistence via kernel-mode malware, spear-phishing, lateral movement using remote services, obfuscated malware, and data collection from local systems and clipboard. |
Attribution | Tied to Chinese APTs; disclosed by Wall Street Journal in September 2024. |
Recommendations | Network segmentation, patch management, Zero Trust architecture, threat intelligence, CISA’s telecom security guidelines (e.g., reducing exposure, advanced segmentation, out-of-band management networks). |
Source | SOCRadar |
Read full article: https://socradar.io/dark-web-profile-salt-typhoon/
The above summary has been generated by an AI language model
Leave a Reply