Salt Typhoon Has Telecom Industry’s Number: Understanding New Attacks & Threats to Critical Infrastructure

2 mins.
Firefly cybersecurity attack and threat, telecom, telecom towers 38885

Summary

With geopolitical challenges on the rise around the world, critical infrastructure, including telecommunications, has become a prime target for hackers. With customers and specialized cybersecurity solutions for the telecom industry, CTOne has significant visibility into these types of attacks, giving us unique and valuable intelligence that powers our enterprise solutions.

Overview

Since 2023, the Chinese APT group Earth Estries (aka. Salt Typhoon) has primarily employed IT-focused attack techniques to compromise more than 20 known organizations across a range of sectors including telecommunications, technology, consulting, chemicals, transportation, as well as government agencies and NGOs across multiple countries

A recent blog from Trend Micro shows that victims came from numerous countries, including: Pakistan, the Philippines, South Africa, Taiwan, Thailand, US, Vietnam, Afghanistan, Brazil, Eswatini, India, Indonesia, Malaysia, and more.

Victimology map of Earth Estries, Source: Trend Micro

A key finding from Trend Micro’s recent investigation also uncovered a new backdoor, GHOSTSPIDER, identified during attacks targeting Southeast Asian telecommunications companies.

In this blog, we will explore some of the common attack paths targeting telecom infrastructure via C2 servers as well as discussing our approach to defending against these attacks. 

What are C2 servers?

C2 (Command-and-Control) servers are used by attackers to remotely manage and control compromised devices or systems within a network. The C2 server acts as the central hub for the attacker to send commands, execute malicious actions, and exfiltrate data from infected machines.

Additionally, C2 traffic is often encrypted with TLS, making it challenging for standard security solutions to inspect the contents and detect attack patterns. As a result, once the C2 connection is established, identifying attacks initiated by the C2 server becomes extremely difficult for defenders.

TLS handshake process. Source: CTOne

Attack Paths

We found that while attackers primarily use IT-based techniques to target CT (Communication Technology) infrastructure, such attacks can occur in both IT and CT networks. Additionally, there is potential for more CT-based attack techniques to be exploited in the future.

The diagram below first illustrates a common approach for attackers to exploit existing vulnerabilities in security solutions like IPS, NGIPS, firewalls, and IDS within IT networks to penetrate CT networks and establish communication with the attacker’s C2 server.

Another possible attack path involves exploiting vulnerabilities in IoT (and Cellular IoT) devices, or devices connected to them, within CT networks to establish a connection between the attacker’s C2 server and CT infrastructure. Learn more about the latest in CIoT threats here.

Without clear visibility into both IT and CT-specific threats, defending against C2 connection establishment and subsequent attacks is impossible.

One of multiple possible attack paths in telecom networks. Source: CTOne

Cyber kill chain by Salt Typhoon. Source: CTOne

Mitigation plan

CTOne specializes in detecting and stopping attacks within CT networks, including IT threat identification. In an increasingly connected world, the scope of threats continues to evolve, and CTOne. offers enterprise solutions to prevent attacks like those from Salt Typhoon. Complementing this, our expert TR2 team is dedicated to understanding and mitigating these targeted threats to the telecom industry, regularly updating the threat database used by CTOne solutions to help manage current and emerging CT risks.

CTOne mitigation plan. Source: CTOne

Contact us today to learn more:
[email protected]

More To Explore

Advantech

Advantech's LTE and 5G NR industrial routers meet regional frequency and certification standards, supporting cloud management (WebAccess/DMP) and zero-touch deployment. With ICR-OS, we provide ready-to-use apps, programmable features, and an open SDK for custom applications. In partnership with CTOne’s security solution, we enhance our service offerings, provide enterprise-grade security for CIoT devices, while reducing TCO and simplifying maintenance

Proscend

Proscend Communications is the leading brand of industrial 4G/5G gateway in Taiwanese Smart City market, focusing on CT (communication technology) solution for various Industrial IoT (IIoT) applications.

By integrating Proscend’s 4G/5G gateways with CTOne’s public mobile network security solution, we effectively address cyber threats in wide-area networks. Our joint solution ensures secure connectivity and protection for numerous IIoT sites operating on 4G/5G public networks without fixed IP addresses.

O'Prueba

O'Prueba specializes in Edge AI Service Gateway solutions. In collaboration with CTOne, its security features can be seamlessly deployed to numerous edge IoT endpoints with a single click via the O'Prueba OOS platform. This integration enables businesses to accelerate deployment, enhance data protection, and drive innovation toward digital transformation.

Clarity

Together with Claroty, we enhance enterprise operational & cyber resiliency for critical infrastructure and secure Cyber-Physical Systems in traditional and hybrid private cellular (5G/LTE) environments.

Netcube Inc.

Netcube is a leader in mobility management solutions for enterprise networking, renowned for its acclaimed authentication and IP automation technologies. Netcube also specializes in implementing 5G connectivity across various industry applications. As an official sales channel partner of CTOne in Korea, we collaborate to offer private 5G enabler solutions with comprehensive security measures. These solutions leverage network slicing-based security controls and ensure industry-specific guaranteed mobility networking.

SpectrEdge

As a professional 5G telecommunication networking solution vendor,  SpectrEdge and CTOne combined solution delivers rapidly deployable 5G Networking with Industry-Leading Security designed for financial, defense, and public safety markets.

Neutroon

Neutroon and CTOne revolutionize wireless management and cybersecurity, offering 'API First' network control, security, and edge orchestration. Neutroon's unified management spans radio, core, devices, and applications, while CTOne enhances end-to-end security. This collaboration empowers CSPs and enterprises with a scalable, intelligent platform for 5G/LTE.

Pegatron

With a strong focus on operational security, the combination of Pegatron`s end-to-end private 5G offerings and CTOne`s cybersecurity solution enables a more effective approach to enabling smart factories. By addressing critical operational and cybersecurity needs, the joint solution enables modern enterprises to realize the true value of next-generation wireless deployment in their smart factories.

Nexcom

As a certified hardware platform partner, NEXCOM’s hardware appliances have been tested and certified as compatible with CTOne's virtualized private 5G security solution. As a certified solution, global organizations are able to confidently harness the power of CTOne’s leading cybersecurity capabilities in combination with NEXCOM's extensive capabilities in Edge AI, Fixed Wireless Access (FWA), private 5G, and secure IoT connectivity.

Saviah

The joint Saviah-CTOne solution leverages Saviah's cost-effective, high-performance, reliable, and interoperable industrial-grade 5GC service and CTOne's proven end-to-end security. The result: a more secure and easier to manage private mobile network environment for enterprises with the ability to leverage the major features and versatility of 5G.

Inventec

Securing OT environments connected to CT networks, the integration of Inventec's Smart Factory DX solution with CTOne extends our security capabilities beyond CT into OT. With our joint solution, we offer enterprises an end-to-end service encompassing IT, OT, and CT, complete with a holistic cybersecurity strategy to support enterprises during digital transformation.

Ataya

The integration of Ataya’s Harmony solution with CTOne provides enterprises with comprehensive connectivity and security visibility across 5G, Wi-Fi, and wired networks. With this joint solution for hybrid networks, enterprises gain full security visibility into Ataya’s Universal Connectivity Platform while supporting a zero-trust strategy and reducing the effort and cost associated with security management.

This website uses cookies for website functionality, traffic analytics, personalization, social media functionality and advertising. Our Cookie Notice provides more information and explains how to amend your cookie settings. Learn more