China’s state-backed hacking group, known as Salt Typhoon, continues its relentless cyber-espionage campaign against global telecommunications networks, despite mounting efforts by governments to counter its activities.
Recent intelligence has uncovered that Salt Typhoon launched an extensive operation between December and January, attempting to breach over 1,000 Cisco network devices worldwide. Many of these devices were linked to major telecommunications providers, reinforcing the group’s focus on infiltrating critical communication networks.
Among the targeted entities were a South African telecom company and a U.S.-based affiliate of a UK telecommunications giant. Security analysts indicate that Salt Typhoon deliberately compiled a list of high-value targets based on their access to telecommunication infrastructure.
Expanding Global Targeting
Researchers confirmed that Salt Typhoon successfully compromised at least seven Cisco devices linked to telecommunications companies across the United States, South Africa, Italy, and Thailand. Additionally, reconnaissance activity was detected in December against IP addresses belonging to Mytel, a Myanmar-based telecom provider.
Beyond targeting telecom companies, Salt Typhoon also set its sights on universities across multiple countries, including Argentina, Bangladesh, Indonesia, Malaysia, Mexico, the Netherlands, Thailand, the U.S., and Vietnam. Analysts believe that infiltrating academic institutions provides access to cutting-edge research in telecommunications, engineering, and technology, further advancing China’s cyber capabilities.
The majority of Cisco devices targeted by the hackers were concentrated in the United States, South America, and India, with the rest spanning over 100 other nations.
Unprecedented Threat to U.S. Telecommunications
U.S. officials have repeatedly warned about Salt Typhoon’s deep penetration into major American telecom networks. Reports confirm that the hacking group has successfully breached at least nine major telecommunications providers, including Verizon, T-Mobile, AT&T, and Lumen.
More concerning, intelligence indicates that Salt Typhoon leveraged its access to intercept call metadata from high-profile political figures. Among the alleged targets were former President Donald Trump, his running mate JD Vance, as well as senior Democratic Party leaders and key members of then-Vice President Kamala Harris’ staff.
This represents a significant escalation in China’s cyber warfare strategy, as it demonstrates not only an intent to compromise infrastructure but also an effort to gather intelligence on influential U.S. officials.
Exploiting Cisco Vulnerabilities for Persistent Access
Salt Typhoon’s primary method of infiltration relies on exploiting unpatched Cisco network devices. The group has been actively leveraging vulnerabilities CVE-2023-20198 and CVE-2023-20273—the first used as an entry point and the second to escalate privileges within compromised systems.
Once inside, the hackers reconfigure the devices, establishing backdoor links to ensure persistent access. Security researchers observed Salt Typhoon scanning networks for vulnerable devices multiple times in December and January, specifically on December 4, 10, 17, and 24, as well as January 13 and 23.
Experts warn that Salt Typhoon’s exploitation of telecommunications infrastructure presents a strategic intelligence threat. Persistent access allows Chinese state-backed operatives to:
Monitor Confidential Conversations – Capturing sensitive discussions of government officials and corporate executives.
Manipulate Data Flows – Altering or intercepting data transmissions to disrupt operations.
Disrupt Communications – Enabling China to destabilize networks in times of geopolitical conflict.
U.S. Government’s Response and Growing Concerns
Despite mounting evidence of Salt Typhoon’s involvement in large-scale cyber espionage, responses from U.S. government agencies have been limited. The FBI and Department of Homeland Security have not publicly commented on the latest findings, while the Department of Justice has refrained from additional disclosures.
However, in January, the U.S. Treasury Department announced sanctions against a Chinese contractor believed to be directly involved in the Salt Typhoon campaign. Officials stated that this cyber espionage group has infiltrated numerous American telecommunications firms since 2019. Yet, the latest campaign targeting critical U.S. infrastructure marks a significant escalation in China’s cyber warfare efforts.
Cybersecurity experts stress that Salt Typhoon’s tactics are part of a broader strategy. Over the past five years, China has increasingly prioritized exploiting vulnerabilities in Cisco devices to establish long-term access to global communication networks.
The implications are severe: this is no longer just about cyberattacks—this is digital warfare. By embedding itself into the backbone of global telecommunications, China is positioning itself to control, manipulate, and weaponize information at will.
The question remains: How long will governments remain complacent before these threats escalate into full-scale cyber conflict?
Help us bring real change! Corporate lobbying has corrupted our system for too long, and it’s time to take action. Please sign and share this petition—your support is crucial in restoring accountability to our government. Every signature counts! Thank you!
https://www.ipetitions.com/petition/restore-our-republic-end-lobbying
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


