China’s Salt Typhoon Still Hacking US Telecoms Despite Sanctions: Report
Chinese state hackers targeted more than 1,000 Cisco routers globally in their latest operation.
The Chinese hacking group Salt Typhoon is still infiltrating U.S. telecom networks, despite being sanctioned from U.S. authorities.
Between December and January, Salt Typhoon breached five telecom networks, including two in the United States, and targeted more than a dozen universities that could give Beijing valuable research and intellectual property, the researchers said.
These victims include a U.S.-based affiliate of a UK telecom provider and a U.S. internet service provider, as well as three from South Africa, Italy, and Thailand. Recorded Future’s Insikt Group observed seven Cisco devices associated with these firms were communicating with the hackers.
The Chinese state actors, which the researchers identified by the moniker “RedMike,” exploited two code vulnerabilities in Cisco network devices’ website interface. The first gave them initial access, and the latter provided “root privileges,” granting the hackers full control of the victim’s network. The hackers then reconfigured the device to retain persistent access.
Recorded Future found more than 12,000 insecure Cisco network devices. The cyber actors appeared to target about 1,000 of them, which were linked to telecommunications providers, the researchers said.
Among them were 13 universities, including U.S. institutions such as Loyola Marymount University, Utah Tech University, and University of California, Los Angeles, the report noted.

The AT&T logo is displayed at a store in Washington, D.C., on Jan. 18, 2022. Stefani Reynolds/AFP via Getty Images
U.S. agencies, in the weeks after discovering Salt Typhoon intrusion, announced countermeasures to safeguard U.S. data.
Three weeks later, authorities sanctioned a Chinese cyber actor and a Chinese cybersecurity firm for aiding the Salt Typhoon attacks.
Reached over the latest report on Salt Typhoon activities, Cisco said it’s aware of the vulnerabilities raised in the report.
“We strongly advise customers to patch known vulnerabilities that have been disclosed and follow industry best practices for securing management protocols,” the spokesperson said.