Two state-backed Chinese hacking groups accessed the mobile phones of more than one million Americans and even hacked court-authorized wiretapping.
In the shadowy world of cyber warfare, where the battlefield is invisible and the weapons are lines of code, a new chapter has emerged—equal parts espionage, paranoia, and digital sleight-of-hand. The latest report from Silent Push, a cybersecurity firm with a knack for uncovering the footprints of state-backed hackers, reads like a dispatch from a Cold War thriller rebooted for the cloud age.
The star of this tale? A Chinese hacking group known as Salt Typhoon, a name that evokes both elemental force and strategic precision. Their mission: infiltrate the digital arteries of global telecommunications networks, siphon off sensitive data, and vanish without a trace. Their method: a constellation of fake websites, bogus email addresses, and cleverly disguised infrastructure that would make even Le Carré blush.
Salt Typhoon is believed to be operated by China’s Ministry of State Security (MSS)—think of it as the digital arm of a geopolitical chess master. Since at least 2019, this group has targeted telecom companies and internet service providers (ISPs) in over 80 countries, including the United States. Their most audacious feat? Gaining access to metadata on over a million American mobile users and even systems used for court-authorized wiretapping.
In layperson’s terms: they didn’t just peek into your inbox—they potentially saw who you called, when, and for how long. And they did it not by sending phishing emails or tricking people into clicking suspicious links, but by exploiting hidden vulnerabilities in software and servers that most people never think about.
Silent Push’s report is a forensic deep dive into how Salt Typhoon and its cousin group, UNC4841, built their digital infrastructure. The researchers uncovered 45 previously unknown domain names—websites that look innocuous but are actually command centers for malware. These domains were registered using gibberish-like email addresses (e.g., [email protected]) and fake American identities with addresses that don’t exist. Think: “Tommie Arnold of 1729 Marigold Lane, Miami”—a character straight out of a cyberpunk novel.
These domains were used to maintain long-term access to infected systems, quietly collecting data and relaying it back to servers controlled by the attackers. Some were even linked to malware with names like Demodex, Snappybee, and Ghostspider—which sound more like indie bands than digital parasites.
Here’s where the Kafkaesque irony kicks in: many of these domains were parked on servers that host thousands of other websites, making them hard to detect. Others were linked to IP addresses that have since been repurposed or “sinkholed”—a cybersecurity term for when researchers take control of a malicious domain to neutralize it. But the sheer sophistication of Salt Typhoon’s setup suggests they may have compromised some of these shared servers, turning common infrastructure into covert listening posts.
The implication is clear: this isn’t just hacking for profit. It’s strategic espionage designed to give China a long-term advantage in global surveillance and intelligence gathering.
If you’re not steeped in cybersecurity jargon, here’s the distilled truth: Salt Typhoon is a state-sponsored hacking group that has quietly infiltrated critical communication systems worldwide. They don’t rely on flashy attacks or ransomware. Instead, they build invisible backdoors into the systems we trust—telecom networks, email servers, even government infrastructure.
Silent Push’s report shows how these groups operate with surgical precision, using fake identities, obscure registration patterns, and overlapping infrastructure to stay hidden. It also reveals how difficult it is to track them—many of their domains have been active for years, and some may still be in use.
Salt Typhoon and UNC4841 aren’t rogue actors; they’re part of a coordinated effort to reshape the global balance of power through digital means. While cybersecurity firms like Silent Push are doing the detective work, the broader public—and policymakers—need to understand the stakes.
In the age of invisible warfare, the front lines aren’t drawn on maps. They’re buried in DNS records, cloaked in fake email addresses, and hidden behind the blinking lights of a server farm.
And the fox, once again, is in the henhouse.
Source: Bitter Winter