#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

29 C
Dubai
Saturday, November 15, 2025
HomeTopics 1Advanced Persistent ThreatSalt Typhoon & UNC4841: Silent Push Uncovers New Domains in Global Espionage...

Salt Typhoon & UNC4841: Silent Push Uncovers New Domains in Global Espionage Campaign

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

Silent Push threat analysts have uncovered dozens of new domains linked to Salt Typhoon and UNC4841, two China-backed Advanced Persistent Threat (APT) groups infamous for stealthy cyber espionage campaigns. According to Silent Push, the findings point to years of activity targeting global telecoms, internet service providers, and critical infrastructure, raising urgent alarms for defenders worldwide.

Salt Typhoon, also known as GhostEmperor, FamousSparrow, and Earth Estries, has been active since at least 2019. The group previously gained unauthorized access to telecom infrastructure in the U.S. and over 80 countries compromising metadata of more than a million mobile users and even breaching court-authorized wiretapping systems.

Silent Push now confirms the discovery of 45 previously unreported domains, some dating back to 2020, which were likely used for long-term persistence and command-and-control operations. Many were tied to fake registrant identities with fabricated U.S. addresses, a tactic often used by nation-state actors to mask activity.

The findings also strengthen links between Salt Typhoon and UNC4841, another PRC-backed group known for exploiting a Barracuda email security zero-day in 2023. Both actors share overlapping technical infrastructure and targeting strategies, particularly against government entities, telecoms, and corporate networks.

The global impact

The report underscores the scale and persistence of Chinese espionage operations against critical infrastructure. For organizations, this translates into risks ranging from data theft and surveillance to service disruption. The Middle East and Africa, rapidly expanding in telecom and cloud adoption, are increasingly attractive targets making vigilance essential for both government and private operators.

“These groups are focused on stealthy, long-term access, not smash-and-grab attacks. If you’re running telecom, ISP, or government infrastructure, you need to check historical logs and DNS telemetry—years back, not just months,” Silent Push analysts warned.

What defenders should do

Silent Push urges organizations to cross-check their DNS logs and telemetry against the uncovered domains and IPs. Security teams should treat any matches as indicators of compromise and respond accordingly.

Here are 10 recommended actions for defenders:

  1. Search DNS logs for historic connections to the newly identified Salt Typhoon and UNC4841 domains.
  2. Review SOA and WHOIS records within your organization’s threat intelligence feeds.
  3. Audit past five years of DNS queries these actors operate with long-term persistence.
  4. Check firewall and proxy logs for outbound traffic to suspicious IP addresses.
  5. Deploy DNS sinkholes where possible to block known malicious domains.
  6. Patch exposed servers immediately, prioritizing email gateways, telecom equipment, and VPN appliances.
  7. Leverage Indicators of Future Attack™ feeds or equivalent threat intel to anticipate pre-weaponized infrastructure.
  8. Strengthen monitoring of anomalous outbound traffic, particularly from high-value systems.
  9. Invest in staff awareness and training to spot subtle persistence techniques.
  10. Collaborate with peers and national CERTs to share intelligence and strengthen collective defense.

The bigger picture

The revelations highlight how nation-state cyber actors invest in multi-year infrastructure planning, making traditional IOC-driven defenses insufficient. Organizations must embrace Zero Trust Security principles and adopt proactive hunting methods.

As the MEA region accelerates digital transformation and 5G rollout, Salt Typhoon and similar actors may view regional networks as valuable intelligence targets. Cybersecurity leaders should ensure that historical telemetry is not overlooked yesterday’s dormant domains may still pose tomorrow’s risks.

Conclusion

Silent Push’s disclosure of Salt Typhoon and UNC4841’s hidden infrastructure is more than a technical revelation it’s a reminder of the quiet, persistent, and deeply strategic nature of cyber espionage. Organizations worldwide are urged to take immediate steps: check logs, update defenses, and anticipate that today’s hidden domains could fuel tomorrow’s breaches.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here