A Chinese government-linked threat group has reportedly infiltrated critical US networks, this time focusing on internet service providers (ISPs) to gather sensitive data and potentially initiate cyberattacks. According to a Wednesday report from The Wall Street Journal, citing sources familiar with the matter, the groupโidentified as Salt Typhoonโhas gained access to the IT systems of several ISPs in recent months.
โItโs likely weโre going to see more of these Typhoon variants,โ John Terrill, CISO of Phosphorus Cybersecurity, told Security Boulevard.
โIn the past, the expectation for cybersecurity teams was to build defenses to the level of capabilities of the expected attacker, which was normally hacktivists and criminals. With the increasing amount of Typhoon activity across multiple industries, I think weโre facing a new expectation that we may all have to start increasing our cybersecurity programs to account for nation-states.โ
Could Salt Typhoon affect OT environments in other areas of infrastructure? At this point, Terrill tells Industrial Cyber, it’s too early to say.
โAt the moment, Salt Typhoon is limited to internet service providers that could definitely be considered critical infrastructure. ISPs donโt tend to have a lot of traditional OT environments but that doesnโt mean those environments arenโt being targeted. The same issues plaguing ISPs are plaguing companies at every level of our supply chain with the same vulnerabilities we continue to see: default credentials, lack of patching, weak passwords, etc,โ he added.
Aside from potential disruption, Terrill says that nation-states might target ISPs โeither as a pivot point into another environment or a collection point for a lot of data that traverses their infrastructure. Itโs why when youโre thinking about attacker personas and capabilities, you donโt worry that much about breaking encryption โ unless youโre worried about nation-states.”
“The joke in the hacker community is that โmath is hard,โ insinuating that you go after the endpoint as the data is already decrypted by that point.โ