|
||

A years-long cyberespionage campaign by a Chinese state-sponsored group known as Salt Typhoon has revealed a striking escalation in both scale and technical sophistication. Operating since at least 2019, the group leveraged a network of compromised domains and DNS infrastructure to infiltrate telecommunications, transportation, and government systems across more than 80 countries.
Stealth access: Recent cybersecurity reports show that hundreds of newly uncovered domains, many dormant for years, were used to maintain long-term access to sensitive networks. Analysts warn that these domains—often mimicking legitimate business or service platforms—were instrumental in enabling covert surveillance, data theft, and reconnaissance operations. Businesses are now being urged to review historical DNS logs to identify signs of past compromise.
Global condemnation: The breadth of the campaign has alarmed Western intelligence agencies. A joint statement by the US, UK, Canada, Germany, and several allies labelled the attacks “indiscriminate” and “unrestrained.” The attackers exploited known vulnerabilities and intercepted unencrypted communications, even targeting politicians’ mobile devices during election campaigns.
What sets Salt Typhoon apart is its patience. Rather than quick data theft, the group employed persistent access strategies, allowing them to quietly siphon data over time. This marks a shift in Beijing’s approach—from rudimentary intellectual property theft to strategic, infrastructure-level espionage. Data harvested could now be used to track individuals’ movements and communications globally, giving Chinese intelligence a long-term surveillance edge.
The domains linked to Salt Typhoon are now being mapped by threat researchers, who fear that the infrastructure may have supported other Chinese APT operations.
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix