#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39.1 C
Dubai
Monday, July 21, 2025
HomeAmericaPRC “Salt Typhoon” Cyber‑Espionage Campaign Targets Global Telecoms – Canada Confirms Mid‑February...

PRC “Salt Typhoon” Cyber‑Espionage Campaign Targets Global Telecoms – Canada Confirms Mid‑February Breach via CVE‑2023‑20198

Date:

Related stories

Phish and Chips: China‑Aligned Espionage Surge Targeting Taiwan Semiconductor Industry

Between March and June 2025, Proofpoint researchers tracked three distinct...

Emergency Alert: Critical Unauthenticated RCE Discovered in Cisco ISE/ISE‑PIC

Cisco has patched three severe unauthenticated remote code execution...
spot_imgspot_imgspot_imgspot_img

Canada and U.S. agencies have issued a joint alert on the exploitation of a critical Cisco vulnerability (CVE‑2023‑20198) by Chinese state‑sponsored actors known as Salt Typhoon. Telecom infrastructure, including three devices in Canada compromised in February 2025, faces directly invasive cyber‑espionage. This global intrusion underscores the urgent need for critical infrastructure defenses right now.

The Canadian Centre for Cyber Security identified that Salt Typhoon breached three telecom network devices, exploiting CVE‑2023‑20198 (a Cisco IOS XE vulnerability) to extract configuration files and establish a GRE tunnel allowing traffic interception.

October 2023 – Vulnerability First Disclosed

Cisco initially disclosed CVE‑2023‑20198 in October 2023. Despite available patches, at least one Canadian telecom provider remained unprotected until targeted in 2025 .

2024‑2025 – Global Espionage Wave

Salt Typhoon’s campaign has penetrated telecom networks across the U.S., South Africa, Italy, Australia, and beyond, with attackers intercepting call metadata and, in some cases, live voice communications.

MEA Perspective: Implications for Middle East & Africa

Regional Telecom Exposure

Telecom operators in MEA, many relying on similar edge device ecosystems, are at equal risk. Unpatched routers and misconfigured networks present fertile ground for exploitation by sophisticated state-actors.

Regulatory Parallels

Agencies like UAE NESA, Saudi NCA, and Kenya DPA mandate penetration testing and patch tracking. This bulletin underscores the regulatory urgency behind enforcing security services and pentesting across critical infrastructure a global best practice underscored by this breach.

Global Context

State-Sponsored Espionage Trend

Salt Typhoon is part of a larger wave of nation-state cyber-espionage targeting telecoms. In late 2024, Australia, Canada, New Zealand, UK, and US issued a joint warning.

Intelligence-Rich Targets

Telecom networks are treasure troves of location, call, and text metadata. As noted by FBI’s Cynthia Kaiser, the data collection is “gigantic and seemingly indiscriminate”, posing serious privacy and national security risks.

Technical Box: MITRE ATT&CK TTPs & IOCs

Initial Access       | Exploiting public‑facing edge device | T1190
Discovery            | Network device reconnaissance         | T1033
Command & Control    | GRE tunnel setup for exfiltration     | T1090
Impact               | Traffic collection, intelligence gain | T1497

Indicators of Compromise (IoCs):

  • CVE‑2023‑20198 exploits targeting Cisco IOS XE edge routers.
  • Unusual GRE tunnels configured on telecom network devices.
  • Access from IP addresses tied to Salt Typhoon.
  • Changes to network config files without administrative approval.

Expert Commentary

“Three network devices … were compromised … enabling traffic collection from the network,” states the Canadian Cyber Centre bulletin, June 19, 2025 (cyber.gc.ca, bleepingcomputer.com, ic3.gov).

FBI’s Cynthia Kaiser warns the campaign’s scale is “gigantic and seemingly indiscriminate”—collecting both metadata and voice communications (cyberscoop.com).

Actionable Takeaways for Defenders

  1. Patch Cisco Edge Devices Immediately – Apply fixes for CVE‑2023‑20198 and similar edge OS vulnerabilities.
  2. Segment & Isolate Telecom Routers – Ensure no direct internet exposure to management interfaces.
  3. Monitor GRE Tunnel Configurations – Alert on unplanned GRE setups in network logs.
  4. Deploy Network Anomaly Detection – Utilize systems designed for telecom‑grade surveillance.
  5. Enforce Multi-Factor Authentication – Add layer to router and admin panel access.
  6. Conduct Regular Pentesting & Audits – Validate device configurations and OS levels.
  7. Log File Integrity Monitoring – Detect unauthorized config changes.
  8. Deploy WAF and IDS Protections – Monitor for exploit attempts.
  9. Share Intelligence Across Borders – MEA telecoms should integrate global news feeds.
  10. Engage Government Cyber Authorities – Follow guidance from NESA, NCA, and Kenya DPA closely.

Conclusion

Salt Typhoon’s exploitation of CVE‑2023‑20198 to hijack global telecom infrastructure marks a seminal moment in state-sponsored cyberespionage. For MEA and global telecom providers, the alert is clear: unpatched routers aren’t just a vulnerability-they are strategic entry points for nation-state actors. Swift patching, layered defenses, and proactive intelligence-sharing are non-negotiable to defend against this threat.

Sources

  • Canadian Cyber Centre & FBI joint bulletin, June 19, 2025
  • BleepingComputer, June 23, 2025
  • SecurityWeek, June 23, 2025
  • The Hacker News, June 24, 2025
  • Arstechnica, June 22, 2025
  • CyberScoop, Feb 19, 2025 summit quote
  • Wikipedia “Salt Typhoon” entry, June 2025
Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here