Salt Typhoon is a People's Republic of China (PRC) state-backed actor that has been active since at least 2019 and responsible for numerous compromises of network infrastructure at major U.S. telecommunication and internet service providers (ISP).[1][2]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1098 | .004 | Account Manipulation: SSH Authorized Keys |
Salt Typhoon has added SSH authorized_keys under root or other users at the Linux level on compromised network devices.[2] |
Enterprise | T1110 | .002 | Brute Force: Password Cracking |
Salt Typhoon has cracked passwords for accounts with weak encryption obtained from the configuration files of compromised network devices.[2] |
Enterprise | T1136 | Create Account |
Salt Typhoon has created Linux-level users on compromised network devices through modification of |
|
Enterprise | T1602 | .002 | Data from Configuration Repository: Network Device Configuration Dump |
Salt Typhoon has attempted to acquire credentials by dumping network device configurations.[2] |
Enterprise | T1587 | .001 | Develop Capabilities: Malware |
Salt Typhoon has used custom tooling including JumbledPath.[2] |
Enterprise | T1048 | .003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
Salt Typhoon has exfiltrated configuration files from exploited network devices over FTP and TFTP.[2] |
Enterprise | T1190 | Exploit Public-Facing Application |
Salt Typhoon has exploited CVE-2018-0171 in the Smart Install feature of Cisco IOS and Cisco IOS XE software for initial access.[2] |
|
Enterprise | T1590 | .004 | Gather Victim Network Information: Network Topology |
Salt Typhoon has used configuration files from exploited network devices to help discover upstream and downstream network segments.[2] |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Salt Typhoon has made changes to the Access Control List (ACL) and loopback interface address on compromised devices.[2] |
Enterprise | T1070 | .002 | Indicator Removal: Clear Linux or Mac System Logs |
Salt Typhoon has cleared logs including .bash_history, auth.log, lastlog, wtmp, and btmp.[2] |
Enterprise | T1040 | Network Sniffing |
Salt Typhoon has used a variety of tools and techniques to capture packet data between network interfaces.[2] |
|
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Salt Typhoon has used publicly available tooling to exploit vulnerabilities.[2] |
Enterprise | T1572 | Protocol Tunneling |
Salt Typhoon has modified device configurations to create and use Generic Routing Encapsulation (GRE) tunnels.[2] |
|
Enterprise | T1021 | .004 | Remote Services: SSH |
Salt Typhoon has modified the loopback address on compromised switches and used them as the source of SSH connections to additional devices within the target environment, allowing them to bypass access control lists (ACLs).[2] |
ID | Name | References | Techniques |
---|---|---|---|
S1206 | JumbledPath | [2] | Archive Collected Data, Hide Infrastructure, Impair Defenses, Indicator Removal: Clear Linux or Mac System Logs, Multi-Stage Channels, Network Sniffing |