Salt Typhoon

Salt Typhoon is a People's Republic of China (PRC) state-backed actor that has been active since at least 2019 and responsible for numerous compromises of network infrastructure at major U.S. telecommunication and internet service providers (ISP).[1][2]

ID: G1045
Version: 1.0
Created: 24 February 2025
Last Modified: 06 March 2025

Techniques Used

Domain ID Name Use
Enterprise T1098 .004 Account Manipulation: SSH Authorized Keys

Salt Typhoon has added SSH authorized_keys under root or other users at the Linux level on compromised network devices.[2]

Enterprise T1110 .002 Brute Force: Password Cracking

Salt Typhoon has cracked passwords for accounts with weak encryption obtained from the configuration files of compromised network devices.[2]

Enterprise T1136 Create Account

Salt Typhoon has created Linux-level users on compromised network devices through modification of /etc/shadow and /etc/passwd.[2]

Enterprise T1602 .002 Data from Configuration Repository: Network Device Configuration Dump

Salt Typhoon has attempted to acquire credentials by dumping network device configurations.[2]

Enterprise T1587 .001 Develop Capabilities: Malware

Salt Typhoon has used custom tooling including JumbledPath.[2]

Enterprise T1048 .003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

Salt Typhoon has exfiltrated configuration files from exploited network devices over FTP and TFTP.[2]

Enterprise T1190 Exploit Public-Facing Application

Salt Typhoon has exploited CVE-2018-0171 in the Smart Install feature of Cisco IOS and Cisco IOS XE software for initial access.[2]

Enterprise T1590 .004 Gather Victim Network Information: Network Topology

Salt Typhoon has used configuration files from exploited network devices to help discover upstream and downstream network segments.[2]

Enterprise T1562 .004 Impair Defenses: Disable or Modify System Firewall

Salt Typhoon has made changes to the Access Control List (ACL) and loopback interface address on compromised devices.[2]

Enterprise T1070 .002 Indicator Removal: Clear Linux or Mac System Logs

Salt Typhoon has cleared logs including .bash_history, auth.log, lastlog, wtmp, and btmp.[2]

Enterprise T1040 Network Sniffing

Salt Typhoon has used a variety of tools and techniques to capture packet data between network interfaces.[2]

Enterprise T1588 .002 Obtain Capabilities: Tool

Salt Typhoon has used publicly available tooling to exploit vulnerabilities.[2]

Enterprise T1572 Protocol Tunneling

Salt Typhoon has modified device configurations to create and use Generic Routing Encapsulation (GRE) tunnels.[2]

Enterprise T1021 .004 Remote Services: SSH

Salt Typhoon has modified the loopback address on compromised switches and used them as the source of SSH connections to additional devices within the target environment, allowing them to bypass access control lists (ACLs).[2]

Software

References