Malware, Vulnerability Management

Novel Malware Leveraged In Salt Typhoon Attacks On US Telcos

Chinese cyber threat

Major U.S. telecommunications firms have been compromised by Chinese state-backed threat group Salt Typhoon with the novel JumbledPath utility for network traffic monitoring and data exfiltration as part of its multi-year cyberespionage campaign, reports BleepingComputer.

Despite exploiting the Cisco IOS vulnerability, tracked as CVE-2018-0171, in one of the intrusions, Salt Typhoon — also known as UNC2286, GhostEmperor, and Earth Estries — mostly leveraged stolen credentials to facilitate initial compromise, which was followed by the exfiltration of network device configuration credentials and the alteration of network configurations to allow command execution and concealed account creation, an analysis from Cisco Talos showed.

Further network activity tracking and data theft have been enabled by several packet-capturing tools and JumbledPath, which used a jump-host to intercept packets on a targeted Cisco device while concealing attacker locations.

This news follows a report from the Recorded Future's Insikt Group noting that more than 1,000 vulnerable Cisco devices worldwide had been targeted by Salt Typhoon. "While there have been some reports that Salt Typhoon is abusing three other known Cisco vulnerabilities, we have not identified any evidence to confirm these claims," said Cisco Talos.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.