Archived/non pay-walled

Here is the original report by Darktrace: Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion

Cybersecurity programs typically focus on protecting core applications and digital assets. But what if the bad guys start targeting trusted defensive measures?

This was the case as reported by Darktrace, a cybersecurity platform provider. Its report sheds light on a sophisticated cyber intrusion linked to Salt Typhoon. The threat actor group is believed to be operated by China’s Ministry of State Security, which conducts cyber espionage campaigns against other countries.

The recent attack features a blend of zero-day exploitation and trusted software abuse. In this instance, Salt Typhoon infiltrated a European telecommunications provider through a gateway device. The attackers then executed a familiar—but evolving—arsenal of stealth techniques. These included DLL sideloading and abusing trusted antivirus software—such as Norton, Bkav, and IObit—to mask malicious payloads under legitimate binaries. The campaign also deployed a custom backdoor known as SNAPPYBEE (aka Deed RAT) by using a dual command-and-control channel (HTTP and unidentified TCP) to sustain the covert access.

Darktrace analysts attribute the incident to Salt Typhoon based on overlapping tactics, infrastructure, and malware patterns seen in prior operations by the group. The event underscores a growing trend: nation-state actors are increasingly weaponizing legitimate tools and supply-chain software to bypass traditional security controls and AI-powered detection.

Given the current geopolitical relationship between the US and China, attacks like this are sure to keep occurring. The two countries compete in world markets. Plus, mutual distrust exists across economic, technological, and military domains.

This campaign also symbolizes broader China-linked cyber operations targeting telecom and communications infrastructure as part of its strategic intelligence-gathering efforts.

“Organizations should expect stealthy activity that blends with normal operations when facing Salt Typhoon,” said Jason Soroko, a Senior Fellow at Sectigo, a provider of comprehensive certificate lifecycle management.”

As this attack illustrates, there has been a shift toward stealth-driven espionage. Attackers now rely less on malware volume. Their focus has turned to exploiting the trust woven into enterprise systems. The time has arrived to apply the zero-trust paradigm to cybersecurity defenses.

  • Sims@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    12
    ·
    20 hours ago

    Oi, the US/Plutocratic anti-China propaganda is running in high gears atmo 🙃 Why anyone would believe these obvious moronic claims about ‘other guys’ doing exactly what US Plutocracy and Capitalism have done for centuries, are beyond me. But they do anyway… Perhaps complete ignorance of what the West and their contrived ideology are doing in/to the world ? Who knows…

    Anyway, congratulations to China for pushing though all the bullshit and continues attacks from US (and its liberal puppets), and because they won against the US Empire of Lies… In fact, congratulations to all enemies of the psychopathic US Plutocracy: Russia, Iran, North Korea, Cuba, Venezuela, and so on and so on. All victims of the Western ideological dictatorship through a hundred years…

    • FauxLiving@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      19 hours ago

      Someone needs to fine tune your parameters a little more my little Salt Typhoon bot friend.

      Your English translation doesn’t quite fit idiomatically, and coming off like a non-native speaker really breaks the “Hello fellow westerners” vibe that you’re going for.