Executive Summary
In 2025, the Chinese state-sponsored APT group Salt Typhoon (Operator Panda) executed a series of sophisticated cyber-espionage operations targeting major US telecom companies and government agencies, including Verizon, AT&T, Lumen Technologies, Viasat, and the US National Guard. Exploiting vulnerabilities in internet-exposed network devices—such as routers, VPN appliances, and security gear—Salt Typhoon bypassed traditional endpoint defenses and established persistent access over the course of nearly a year. Their campaigns involved targeting wiretapping infrastructure and internal communications, enabling data exfiltration and pre-positioning for further attacks.
This incident underscores the escalating risk posed by advanced nation-state attackers exploiting unpatched edge devices. With a surge in supply-chain attacks, east-west lateral movement, and strain on government cyber resources following budget cuts, organizations must prioritize zero trust segmentation, unified network visibility, and proactive threat detection to combat evolving cross-domain adversaries.
Why This Matters Now
Salt Typhoon’s 2025 campaign exemplifies how nation-state attackers can outmaneuver defenders by exploiting overlooked vulnerabilities in network infrastructure. As government cyber agencies face resourcing constraints and threat groups evolve, the urgency for zero trust, robust segmentation, and real-time monitoring has never been higher for organizations that depend on secure communications.
Attack Path Analysis
The attack began with Salt Typhoon exploiting critical vulnerabilities (such as React2Shell or unpatched network edge devices) or supply chain weaknesses to gain an initial foothold. The adversary escalated privileges, moving from exploited processes or compromised accounts to more privileged access and manipulating cloud roles or credentials. Leveraging their elevated position, Salt Typhoon moved laterally inside telecom and SaaS/cloud environments, exploiting weak east-west segmentation and container controls, ultimately establishing persistent command and control channels for remote interaction. Sensitive data was then exfiltrated using covert outbound channels, encrypted tunnels, or SaaS integrations, bypassing weak or misconfigured egress controls. Finally, the attackers achieved their operational objectives—stealing business-critical data, disrupting cloud and telecom environments, or pre-positioning for long-term espionage.
Kill Chain Progression
Initial Compromise
Description
Salt Typhoon gained initial access by exploiting the React2Shell vulnerability in widely deployed cloud applications or leveraging unpatched network edge devices common in telecom environments.
Related CVEs
CVE-2025-55182
CVSS 10An unauthenticated remote code execution vulnerability in React Server Components due to unsafe deserialization, allowing attackers to execute arbitrary code via crafted HTTP requests.
Affected Products:
React React Server Components – 19.0.0, 19.1.0, 19.1.1, 19.2.0
Next.js Next.js – 15.x, 16.x
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Supply Chain Compromise: Compromise Software Supply Chain
Command and Scripting Interpreter
Valid Accounts
Supply Chain Compromise: Compromise Software Dependencies and Development Tools
Modify Authentication Process
Phishing: Spearphishing Attachment
Man-in-the-Middle
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Update System Components and Software
Control ID: 6.2.4
NYDFS 23 NYCRR 500 – Access Privileges
Control ID: 500.07
DORA (Digital Operational Resilience Act) – ICT Risk Management
Control ID: Art. 6(1)
CISA Zero Trust Maturity Model 2.0 – Identity and Access Controls
Control ID: Identity Pillar - Access Management
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
Primary target of Salt Typhoon APT operations, with major carriers breached for espionage and wiretapping system compromise requiring enhanced encrypted traffic protection.
Government Administration
National Guard compromised by Salt Typhoon for nearly a year, CISA budget cuts reducing defensive capabilities against nation-state attacks and infrastructure protection.
Computer Software/Engineering
React2Shell vulnerability with CVSS 10 affecting third of cloud providers, plus Shai-Hulud malware targeting open source supply chains and development workflows.
Financial Services
Salesforce OAuth token compromise affecting financial institutions, requiring enhanced zero trust segmentation and egress security to prevent data exfiltration and lateral movement.
Sources
- 5 Threats That Defined Security in 2025https://www.darkreading.com/vulnerabilities-threats/five-threats-that-defined-security-2025Verified
- Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Componentshttps://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/Verified
- Security Advisory 2025-041https://cert.europa.eu/publications/security-advisories/2025-041/pdfVerified
- CVE-2025-55182: Critical Vulnerability, React2Shell, Allows for Unauthenticated RCEhttps://www.cybereason.com/blog/cve-2025-55182-rce-vulnerabilityVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Unified Zero Trust controls—such as network segmentation, egress filtering, enforced encryption, and real-time threat detection—would have constrained or detected Salt Typhoon’s movement at every stage, reducing attack surface, preventing lateral spread, and limiting exfiltration via policy-driven enforcement integrated across multi-cloud and SaaS environments.
Control: Cloud Firewall (ACF)
Mitigation: Block inbound exploit attempts and malicious payloads at the perimeter.
Control: Zero Trust Segmentation
Mitigation: Contain privilege abuse to the initially compromised workload or segment.
Control: East-West Traffic Security
Mitigation: Stop or alert on unauthorized lateral movement attempts.
Control: Threat Detection & Anomaly Response
Mitigation: Detect and disrupt covert C2 channels and suspect outbound communications.
Control: Egress Security & Policy Enforcement
Mitigation: Block or alert on unauthorized and anomalous outbound data transfers.
Enable rapid detection, containment, and coordinated response to minimize business impact.
Impact at a Glance
Affected Business Functions
- Web Applications
- Customer Portals
- E-commerce Platforms
Estimated downtime: 5 days
Estimated loss: $500,000
Potential exposure of sensitive customer data, including personal information and payment details, due to unauthorized access facilitated by the vulnerability.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust segmentation and workload isolation to prevent privilege escalation and lateral movement.
- • Deploy inline cloud firewalling and intrusion prevention to block known and emerging exploit attempts at the perimeter and internal segments.
- • Implement continuous egress and east-west traffic policy enforcement to detect and block unsanctioned data flows and shadow SaaS access.
- • Integrate real-time threat detection, anomaly response, and automated incident workflows for early discovery and rapid containment.
- • Maintain multicloud visibility and centralized governance to ensure policy consistency, reduce attack surface, and accelerate incident remediation.



