One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years - #APT40
The Salt Typhoon cyber espionage campaign, attributed to Chinese state-sponsored hackers, has compromised at least nine U.S. telecommunications companies, including major providers like AT&T, Verizon, and Lumen Technologies. The attackers exploited vulnerabilities in network devices, potentially monitoring network traffic and accessing sensitive information of government officials. In response, the U.S. government has imposed sanctions on a Chinese cybersecurity firm and is taking steps to bolster telecom infrastructure security. The Cybersecurity and Infrastructure Security Agency (CISA) played a crucial role in detecting and responding to these threats, emphasizing the need for improved security measures in critical infrastructure sectors. Despite available patches for vulnerabilities like ProxyLogon, many systems remain unpatched, highlighting the ongoing challenges in cybersecurity. The Federal Communications Commission has mandated enhanced network security for U.S. telecom carriers, while experts urge organizations to strengthen their defenses against these sophisticated cyber threats.