Executive Summary
In 2025, the Chinese state-sponsored cyber group known as Salt Typhoon orchestrated a sophisticated global espionage campaign, compromising government and critical infrastructure across 37 countries and conducting reconnaissance in 155 nations. The attackers exploited unpatched vulnerabilities in networking equipment, including those from Ivanti, Palo Alto, and Cisco, to gain initial access. Once inside, they established persistent access by modifying access control lists, creating privileged accounts, and enabling remote management on unusual high ports. This allowed them to monitor communications, harvest administrator credentials, and exfiltrate sensitive data through covert tunnels, all while remaining undetected for extended periods. The campaign's targets included telecommunications networks, government systems, transportation hubs, lodging networks, and military infrastructure, enabling continuous surveillance of individuals, communications, and movements globally. (forbes.com)
The Salt Typhoon campaign underscores the escalating threat posed by state-sponsored cyber actors and the vulnerabilities within critical infrastructure. The attackers' ability to exploit known vulnerabilities and maintain long-term access highlights the urgent need for organizations to prioritize timely patching, robust access controls, and comprehensive monitoring to detect and mitigate such sophisticated threats.
Why This Matters Now
The Salt Typhoon campaign highlights the urgent need for organizations to prioritize timely patching, robust access controls, and comprehensive monitoring to detect and mitigate sophisticated state-sponsored cyber threats.
Attack Path Analysis
The adversary initiated the attack by exploiting misconfigured cloud storage services to gain unauthorized access. They then escalated privileges by modifying cloud resource hierarchies, allowing broader control over the environment. Utilizing valid credentials, the attacker moved laterally across cloud services to access additional resources. They established command and control by leveraging cloud services to maintain persistent access. Sensitive data was exfiltrated by transferring it to external cloud storage controlled by the adversary. Finally, the attacker disrupted operations by modifying or deleting critical cloud resources.
Kill Chain Progression
Initial Compromise
Description
The adversary exploited misconfigured cloud storage services to gain unauthorized access to sensitive data.
Related CVEs
CVE-2025-20393
CVSS 10A critical vulnerability in Cisco email security appliances allows remote attackers to execute system-level commands, leading to unauthorized access and potential data exfiltration.
Affected Products:
Cisco Secure Email Gateway – < 14.2.1
Cisco Secure Email and Web Manager – < 14.2.1
Exploit Status:
exploited in the wildCVE-2025-41244
CVSS 7.8A vulnerability in VMware Aria Operations and VMware Tools allows local privilege escalation, enabling non-privileged users to gain root access on virtual machines.
Affected Products:
VMware Aria Operations – < 8.10.2
VMware VMware Tools – < 12.4.9
Exploit Status:
exploited in the wildCVE-2025-37164
CVSS 9.8A code injection vulnerability in HPE OneView's REST API endpoint allows remote unauthenticated attackers to execute arbitrary code, potentially leading to full control of affected environments.
Affected Products:
Hewlett Packard Enterprise OneView – < 11.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Phishing
Command and Scripting Interpreter
Valid Accounts
OS Credential Dumping
Network Service Discovery
Remote Services
Exfiltration Over C2 Channel
Inhibit System Recovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure that security policies and operational procedures for security monitoring and testing are documented, in use, and known to all affected parties.
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
APT campaigns targeting 37 countries create critical risks to encrypted communications, lateral movement prevention, and east-west traffic security in government networks.
Telecommunications
Salt Typhoon references indicate telecom infrastructure vulnerable to encrypted traffic interception, requiring enhanced HPE and egress security policy enforcement capabilities.
Utilities
Critical infrastructure targeting across 155 countries exposes utility networks to zero trust segmentation failures and multicloud visibility control weaknesses.
Defense/Space
Advanced persistent threats against defense systems require strengthened threat detection, anomaly response, and secure hybrid connectivity to prevent data exfiltration.
Sources
- The Shadow Campaigns: Uncovering Global Espionagehttps://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/Verified
- NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizationshttps://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/Verified
- Broadcom finally patches dangerous VMware zero-day exploited by Chinese hackershttps://www.techradar.com/pro/security/broadcom-finally-patches-dangerous-vmware-zero-day-exploited-by-chinese-hackersVerified
- Cisco email security products actively targeted in zero-day campaignhttps://www.techradar.com/pro/security/cisco-email-security-products-actively-targeted-in-zero-day-campaignVerified
- A critical HPE OneView flaw is being exploited in the wild - here's everything we know so farhttps://www.itpro.com/security/hpe-oneview-critical-vulnerability-cisa-advisoryVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it embeds security directly into the cloud fabric, potentially reducing the attacker's ability to escalate privileges, move laterally, and exfiltrate data.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit misconfigured storage services would likely be constrained, limiting unauthorized access to sensitive data.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges by modifying resource hierarchies would likely be limited, reducing their control over the environment.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement across cloud services would likely be restricted, limiting access to additional resources.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish and maintain command and control would likely be constrained, reducing persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data to external storage would likely be limited, reducing data loss.
The attacker's ability to disrupt operations by altering critical resources would likely be constrained, reducing operational impact.
Impact at a Glance
Affected Business Functions
- Government Operations
- Critical Infrastructure Management
- Law Enforcement
- Financial Services
Estimated downtime: 14 days
Estimated loss: $5,000,000
Sensitive government communications, critical infrastructure schematics, law enforcement records, and financial data.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement.
- • Utilize East-West Traffic Security to monitor and control internal traffic, detecting and mitigating lateral movement attempts.
- • Deploy Multicloud Visibility & Control solutions to gain comprehensive insights into cloud environments and detect anomalous activities.
- • Enforce Egress Security & Policy Enforcement to control outbound traffic and prevent data exfiltration to unauthorized destinations.
- • Integrate Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious activities in real-time.

