{"id":386,"date":"2024-09-26T12:07:17","date_gmt":"2024-09-26T12:07:17","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=386"},"modified":"2024-09-26T12:07:17","modified_gmt":"2024-09-26T12:07:17","slug":"chinese-hackers-allegedly-hacked-us-isps-for-cyber-espionage","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=386","title":{"rendered":"Chinese hackers allegedly hacked US ISPs for cyber espionage"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Chinese state-sponsored hackers have been found to have gained access to multiple US internet service providers (ISPs) to establish persistence and carry out cyber espionage activities.<\/p>\n<p>The Chinese <a href=\"https:\/\/www.csoonline.com\/article\/548564\/5-signs-youve-been-hit-with-an-apt.html\">APT<\/a> group, Salt Typhoon, infiltrated these services in recent months in \u201cpursuit of sensitive information,\u201d\u00a0according to a WSJ report.<\/p>\n<p>\u201cInvestigators are exploring whether the intruders gained access to Cisco Systems routers, core network components that route much of the traffic on the internet,\u201d WSJ reported, citing people familiar with the matter. A Cisco spokesperson reportedly said \u201cno Cisco Routers were involved\u201d in the Salt Typhoon activity.<\/p>\n<p>The threat actor, which Microsoft also tracks as GhostEmperor and FamousSparrow, is known to have exploited unpatched <a href=\"https:\/\/www.csoonline.com\/article\/570653\/the-microsoft-exchange-server-hack-a-timeline.html\" target=\"_blank\" rel=\"noopener\">Microsoft Exchange Server vulnerabilities<\/a> in 2021 to gain initial access into networks.<\/p>\n<h2 class=\"wp-block-heading\">Infecting ISPs through zero-days<\/h2>\n<p>It has become quite commonplace for hackers linked with the Chinese government to attempt cyber espionage on US soil. These hackers exploit vulnerabilities in network devices and use sophisticated techniques to breach security.<\/p>\n<p>Previously, Black Lotus Labs observed that China\u2019s Volt Typhoon was observed was <a href=\"https:\/\/www.csoonline.com\/article\/3497078\/chinas-volt-typhoon-exploits-versa-zero-day-to-hack-us-isps-and-it-firms.html\" target=\"_blank\" rel=\"noopener\">exploiting a zero-day vulnerability<\/a> in Versa Director, a software platform for managing SD-WAN infrastructure used by ISPs and managed service providers (MSPs).<\/p>\n<p>In February, the FBI issued an <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-038a\">advisory<\/a> against Volt typhoon\u2019s threat activities, listing out the tactics, techniques, and procedures (TTPs) used by the group. \u201cThe US authoring agencies have confirmed that Volt Typhoon has compromised the IT environments of multiple critical infrastructure organizations \u2014 primarily in Communications, Energy, Transportation Systems, and Water and Wastewater Systems Sectors \u2014 in the continental and non-continental United States and its territories, including Guam,\u201d the advisory said. <\/p>\n<p>In a December 2023 operation, the FBI <a href=\"https:\/\/www.justice.gov\/opa\/pr\/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical\" target=\"_blank\" rel=\"noopener\">disrupted<\/a> a fraction of the Volt Typhoon operations by pulling down a botnet of hundreds of US based small-office or home-office (SOHO) routers.\u00a0<\/p>\n<p>To obtain initial access, Volt Typhoon actors commonly exploit vulnerabilities in networking appliances such as those from Fortinet, Ivanti Connect Secure (formerly Pulse Secure), NETGEAR, Citrix, and Cisco. Salt Typhoon, along with another China-linked APT <a href=\"https:\/\/www.csoonline.com\/article\/3532252\/reveal-of-chinese-controlled-botnet-is-another-warning-to-cisos-to-keep-up-with-asset-and-patch-management.html\" target=\"_blank\" rel=\"noopener\">Flax Typhoon<\/a>, likely employs similar techniques for early infections.<\/p>\n<p>Salt Typhoon\u2019s activities are part of a larger pattern of Chinese cyber operations aimed at embedding within the infrastructure of foreign nations, with a focus on espionage and potential disruption. These types of attacks on ISPs are particularly dangerous because they can compromise sensitive communications, provide a foundation for future cyberattacks, and disrupt national security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Chinese state-sponsored hackers have been found to have gained access to multiple US internet service providers (ISPs) to establish persistence and carry out cyber espionage activities. The Chinese APT group, Salt Typhoon, infiltrated these services in recent months in \u201cpursuit of sensitive information,\u201d\u00a0according to a WSJ report. \u201cInvestigators are exploring whether the intruders gained access [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/386"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=386"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/387"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}