#SaltTyphoon

@as400 @khalid @postmarketOS I'm daily driving a #Librem5 with #postmarketOS and I've tested reliable voice calling successfully with multiple carriers in two counties. Also, tested with #PureOS.

Owners of older units may need to upgrade modem firmware and enable VoLTE manually. The real problem in my limited knowledge is carriers are blocking devices which are not on their 'approved list' or which they think are not VoLTE capable.

Another, bigger questions is: why are people still using unencrypted legacy voice calls for personal communications in 2026?

#SaltTyphoon

2026-02-23

Watching talks on AI and Security at NTCA RTime this week. Wondering what if anything the co-ops are going to have to say about #CALEA and #SaltTyphoon

Any questions I should ask the presenters?

Maybe what, if any, help they're getting from #CISA

#Telecom

2026-02-10

Senator says #ATT , #Verizon blocking release of #SaltTyphoon #security assessment reports-Reuters

Dem Sen #Cantwell said Verizon & AT&T are blocking release of key docs about an alleged massive #Chinese #spying operation that infiltrated US #telecom networks known as Salt Typhoon & wants their CEOs to appear before Congress to answer questions

Cantwell asked both companies to turn over security assessments conducted by Alphabet #cybersecurity unit #Mandiant
#privacy

reuters.com/business/media-tel

2026-02-09

Norge 🇳🇴 har bekræftet, at den kinesiske 🇨🇳 #SaltTyphoon har hacket virksomheder i landet

Gruppen er kendt for at have hacket store amerikanske 🇺🇸 tele-selskaber i 2024

Det er almindeligt antaget, at den samme kampagne har påvirket tele-selskaber over hele verden
therecord.media/norawy-intelli

2026-02-07

Norway’s PST has confirmed Salt Typhoon activity affecting Norwegian organizations, citing exploitation of vulnerable network devices within critical infrastructure environments.

The 2026 assessment frames cyber operations as China’s primary intelligence vector, while noting that Russia remains the most significant overall threat due to sustained espionage, infrastructure mapping, and hybrid operations. The report reinforces the convergence of cyber tradecraft with influence and HUMINT activity.

For defenders, the findings highlight the importance of network device visibility, cross-sector intelligence sharing, and long-term monitoring.

💬 What defensive gaps does this assessment expose?

🔔 Follow TechNadu for ongoing threat intelligence reporting

#ThreatIntelligence #SaltTyphoon #NationStateThreats #CriticalInfrastructure #CyberDefense #InfoSec #TechNadu

Norwegian intelligence discloses country hit by Salt Typhoon campaign
2026-02-07

🪼 At Nexus 2025, Mandiant Chief Technology Officer Charles Carmakal explained the tactics employed by #SaltTyphoon, one of the most active and dangerous China-affiliated threat actors. Salt Typhoon's aggression against Western assets, Carmakal cautions, indicates a shift in strategy by China in cyberspace.

Watch the top sessions and more from #Nexus2025 here: nexusconnect.io/nexus-25

অর্ঘ্য 🏏📚 💻StringsVsAtoms
2026-02-06

In a report published on Friday, the Norwegian Police Security Service accused the APT group , believer to be working for the Chinese government, of breaking into Norwegian network devices to conduct espionage.

Report 🔗 pst.no/wp-content/uploads/2026
1/2

AT&T, Verizon blocking release of Salt Typhoon security assessment reports It must be pretty bad. I'd guess the China state-sponsored hackers are probably still be inside their US phone networks. #natsec #bigtech #salttyphoon www.reuters.com/business/med...

Senator says AT&T, Verizon blo...

Matthias KrämerKraemer_HB
2026-01-27

🧵2/2
...End-to-end encryption without backdoors is more secure than encryption with backdoors. Communications systems that no government can access are also communications systems that adversary governments cannot access. The tradeoff is between absolute security for everyone, including criminals, and compromised security for everyone, including governments.

Salt Typhoon demonstrated that compromised security for everyone means exactly that."
shanakaanslemperera.substack.c

Matthias KrämerKraemer_HB
2026-01-27

"Salt Typhoon provided the empirical refutation. The backdoors existed. The adversary found them. The surveillance apparatus built for Western law enforcement became an intelligence collection platform for Chinese intelligence.

The policy implications are uncomfortable for governments that have spent decades demanding exactly the access mechanisms that Salt Typhoon exploited.

The resolution is not complex, only politically difficult.
🧵1/2

2026-01-09

Scope Of Chinese ‘Salt Typhoon’ Hack Keeps Getting Worse, As Trump Dismantles U.S. Cybersecurity Defenses

web.brid.gy/r/https://www.tech

2026-01-09

Den kinesiske 🇨🇳 hackergruppe #SaltTyphoon har hacket de e-mailsystemer, der bruges af medarbejdere i flere udvalg i det amerikanske 🇺🇸 Repræsentanternes Hus

»Kinesiske efterretningstjenester fik adgang til e-mailsystemer, der blev brugt af nogle medarbejdere i Repræsentanternes Hus' Kina-udvalg samt medarbejdere i udenrigsudvalget, efterretningsudvalget og forsvarsudvalget, ifølge personer med kendskab til angrebet. Indtrængningen blev opdaget i december.«
news.risky.biz/r/18988989?m=75 (paywalled)

Teddy / Domingo (🇨🇵/🇬🇧)TeddyTheBest@framapiaf.org
2025-12-30

5 Threats That Defined #Security in 2025. 2025 included a number of monumental #threats, from the global attacks of #SaltTyphoon to dangerous #vulnerabilities like #React2Shell.
darkreading.com/vulnerabilitie

US is unable to stop the massive Chinese intelligence hack of it’s telecom networks, ongoing for at least two years Chinese have access to the unencrypted communications of almost every American #SaltTyphoon #hack #ustelecoms #hybridwar #war

RE: https://bsky.app/profile/did:plc:5u54z2qgkq43dh2nzwzdbbhb/post/3m7t4ncaxej2y

Benjamin Carr, Ph.D. 👨🏻‍💻🧬BenjaminHCCarr@hachyderm.io
2025-12-12

#SaltTyphoon pair attended #Cisco cyber school, expert claims
SentinelLabs linked #YuYang and #QiuDaibing, two alleged members of #China's state #hacking group, to participants of the 2012 Cisco Networking Academy Cup.
The initiative is still going today. It typically runs for a few months and is geared toward beginners learning foundational #cybersecurity skills, which are then tested in competitions like capture the flag events.
theregister.com/2025/12/11/sal

2025-12-12

Two former Cisco Networking Academy students have been linked to the Salt Typhoon campaign, which has compromised 80+ global telecom providers. Investigators say the attackers used technical skills learned directly from Cisco’s curriculum to target IOS and ASA devices.

This case reignites debate over whether corporate training programs in politically tense regions may inadvertently strengthen future threat actors.

Source: cybersecuritynews.com/chinese-

Curious how the community views this risk.
Follow TechNadu for more verified cybersecurity reporting.

#CyberSecurity #Infosec #CiscoSecurity #ThreatIntel #SaltTyphoon #TelecomSecurity #SecurityResearch

2 Chinese Hackers Trained in Cisco Program Now Leading Sophisticated Attacks on Cisco Devices
Miguel Afonso Caetanoremixtures@tldr.nettime.org
2025-12-11

"Cisco’s Networking Academy, a global training program designed to educate IT students in the basics of IT networks and cybersecurity, proudly touts its accessibility to participants around the world: “We believe education can be the ultimate equalizer, enabling anyone, regardless of background, to develop expertise and shape their destiny in a digital era,” reads the first line on its website.

That laudable statement, however, reads a bit differently when the “destiny” of those students appears to be owning a majority stake in companies linked to one of the most successful Chinese state-sponsored hacking operations ever to target the West—and many of Cisco's own products.

That's the surprising conclusion of Dakota Cary, a researcher at cybersecurity firm SentinelOne and the Atlantic Council, who, like many security analysts, has closely tracked the Chinese state-sponsored hacker group known as Salt Typhoon. That cyberespionage group gained notoriety last year when it was revealed that the hackers had penetrated at least nine telecom companies and gained the ability to spy on Americans’ real-time calls and texts, specifically targeting then-presidential and vice presidential candidates Donald Trump and JD Vance, among many others."

wired.com/story/2-men-linked-t

#CyberSecurity #China #SaltTyphoon #StateHacking #Cisco #CiscoAcademy

2025-12-11

2 Men Linked to China’s #SaltTyphoon #Hacker Group Likely Trained in a #Cisco ‘Academy’

The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years before the group targeted Cisco’s devices in a spy campaign.
#security #China

wired.com/story/2-men-linked-t

2025-12-10

GCA just released its 2025 cyber trends review and our response strategies for 2026, outlining where the Internet proved fragile this year and what we are doing to strengthen it.

👉 Persistent Telecom Hacks (like #SaltTyphoon) Exposed Infrastructure Fragility

👉 #AI Became a Force Multiplier

👉 The Cyber Skills Gap Deepened as AI Automated Routine Tasks

👉 Cybercriminals Capitalized on Crisis and Seasonal Giving

👉 Cybersecurity-focused #Nonprofits Struggled in an Uncertain Funding Landscape

“As we look to 2026, our focus is enabling everyday resilience,” said Brian Cute, Interim CEO of GCA. “If we give people simple, proven tools and pair them with infrastructure-level improvements and global collaboration, we can meaningfully bend the curve on cyber risk.”

Read more: globalcyberalliance.org/five-c

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst