We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

China’s Salt Typhoon Keeps Breaching Telecom Networks

China’s Salt Typhoon Keeps Breaching Telecom Networks
Husain Parvez First published on 17th February 2025 Cybersecurity Researcher

A Chinese state-backed hacking group known as Salt Typhoon has continued targeting telecommunications providers worldwide, despite recent US sanctions and cybersecurity warnings. According to a report from cybersecurity firm Recorded Future, the group has successfully breached multiple telecom networks in the US, Europe, Africa, and Asia by exploiting vulnerabilities in Cisco network devices.

Breaking the news first, TechCrunch said that the hackers have also targeted universities conducting research in telecommunications and technology, raising concerns over China's ongoing cyber espionage activities. Salt Typhoon, also tracked as RedMike, Earth Estries, and GhostEmperor, has been linked to cyberattacks on at least five major telecommunications providers between December 2024 and January 2025.

The group has previously infiltrated major US telecom companies, including AT&T and Verizon, and has been accused of eavesdropping on government communications and political figures. TechCrunch also reported that the hackers have also gained access to law enforcement surveillance systems, potentially compromising sensitive investigations.

The hacking group has focused on exploiting two well-documented vulnerabilities in Cisco network devices, identified as CVE-2023-20198 and CVE-2023-20273. These security flaws allow attackers to create administrative accounts on affected systems and execute commands that require high-level privileges. Cisco first issued warnings about these vulnerabilities in October 2023.

However, many organizations have failed to implement the necessary security updates, nor have they removed affected devices from the public internet, leaving them vulnerable to attack. According to TechCrunch, Salt Typhoon has used these vulnerabilities to compromise over 1,000 Cisco devices globally, particularly those linked to telecommunications providers.

Recorded Future’s senior director of strategic intelligence, Jon Condra, stated that Salt Typhoon’s activities are "truly global in scope" and likely tied to China's strategic intelligence-gathering efforts. He emphasized that the group's ability to infiltrate critical infrastructure could be used for future geopolitical conflicts.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address