Salt Typhoon Exploits CVE-2018-0171 to Infiltrate U.S. Telecom Networks

Article Highlights
Off On

Cisco revealed that a sophisticated Chinese threat actor group known as Salt Typhoon successfully exploited the CVE-2018-0171 vulnerability. Through well-funded and meticulously planned efforts, the adversary infiltrated major U.S. telecommunications networks, maintaining access for over three years. This campaign not only underscores the persistence and capacity of advanced persistent threat (APT) groups but also demonstrates their ability to compromise numerous vendors’ equipment over a prolonged period. Cisco’s findings paint a concerning picture of the tactics and techniques utilized by Salt Typhoon, as they highlight vulnerabilities within the critical infrastructure of telecommunications networks.

Sophisticated Planning and Infiltration

Cisco’s investigation into the breach revealed that contrary to the initial speculations, Salt Typhoon attackers did not exploit other vulnerabilities like CVE-2023-20198 and CVE-2023-20273. Instead, they primarily utilized stolen valid credentials to gain initial access. The details of how these credentials were initially obtained remain obscure, but once inside, the threat actor adopted a methodical approach to harvest even more credentials from network device configurations. These included SNMP, TACACS, and RADIUS traffic, which enabled them to grab additional credential details for uninterrupted access. The careful planning and execution resemble the operations of organized, state-sponsored activities.

Salt Typhoon’s expertise in leveraging living-off-the-land (LOTL) techniques allowed them to use compromised devices effectively as pivot points, enabling lateral movement within and between telecom networks. These intermediate relays facilitated inconspicuous data exfiltration, which helped the attackers to operate undetected for extended durations. Altering network configurations to create local accounts, allowing Guest Shell access, and establishing SSH-based remote access were just some of their critical maneuvers. Their application of a custom tool named JumbledPath enabled packet capture on remote Cisco devices, clearing and disabling logs thereby hindering forensic investigations.

Maintaining Stealth and Prolonged Access

To remain undetected, Salt Typhoon periodically erased logs such as .bash_history, auth.log, lastlog, wtmp, and btmp, leaving minimal forensic evidence. This deliberate log-cleanup routine cloaked their movements and activities on compromised devices. An additional tactic saw them modify loopback interface addresses on affected switches to create backdoor SSH connections, circumventing access control lists (ACLs) and thereby preserving their access without raising alarms. This level of operational security indicates the thoroughness and caution employed by the attackers throughout their campaign.

Moreover, a distinctive characteristic of Salt Typhoon’s methodology involved the significant targeting of devices with exposed Smart Install (SMI). However, despite identifying substantial exploitation of CVE-2018-0171, Cisco noted that this activity was not linked directly to Salt Typhoon nor associated with any other known threat actors. This finding suggests that while CVE-2018-0171 exploitation was widespread, it was likely conducted separately from the primary intrusion activities credited to Salt Typhoon. This distinction amidst their campaign reflects the complexity and layered structure of such cyber operations.

Implications and Future Considerations

Cisco has disclosed that a highly skilled Chinese threat actor group, named Salt Typhoon, successfully exploited the CVE-2018-0171 vulnerability. This group, supported by substantial resources and careful planning, managed to infiltrate significant U.S. telecommunications networks and sustain their access for over three years. This protracted campaign underscores the persistence and capability of advanced persistent threat (APT) groups. It also showcases their ability to compromise a wide array of vendors’ equipment over an extended period. Cisco’s investigation provides a troubling insight into the tactics and techniques employed by Salt Typhoon. Their efforts reveal critical vulnerabilities within the telecommunications infrastructure, which pose significant risks to the security and reliability of these networks. This discovery calls attention to the pressing need for enhanced security measures and vigilance within the telecommunications industry to combat such sophisticated cyber threats effectively.

Explore more

How Will the 2026 Social Security Tax Cap Affect Your Paycheck?

In a world where every dollar counts, a seemingly small tweak to payroll taxes can send ripples through household budgets, impacting financial stability in unexpected ways. Picture a high-earning professional, diligently climbing the career ladder, only to find an unexpected cut in their take-home pay next year due to a policy shift. As 2026 approaches, the Social Security payroll tax

Why Your Phone’s 5G Symbol May Not Mean True 5G Speeds

Imagine glancing at your smartphone and seeing that coveted 5G symbol glowing at the top of the screen, promising lightning-fast internet speeds for seamless streaming and instant downloads. The expectation is clear: 5G should deliver a transformative experience, far surpassing the capabilities of older 4G networks. However, recent findings have cast doubt on whether that symbol truly represents the high-speed

How Can We Boost Engagement in a Burnout-Prone Workforce?

Walk into a typical office in 2025, and the atmosphere often feels heavy with unspoken exhaustion—employees dragging through the day with forced smiles, their energy sapped by endless demands, reflecting a deeper crisis gripping workforces worldwide. Burnout has become a silent epidemic, draining passion and purpose from millions. Yet, amid this struggle, a critical question emerges: how can engagement be

Leading HR with AI: Balancing Tech and Ethics in Hiring

In a bustling hotel chain, an HR manager sifts through hundreds of applications for a front-desk role, relying on an AI tool to narrow down the pool in mere minutes—a task that once took days. Yet, hidden in the algorithm’s efficiency lies a troubling possibility: what if the system silently favors candidates based on biased data, sidelining diverse talent crucial

HR Turns Recruitment into Dream Home Prize Competition

Introduction to an Innovative Recruitment Strategy In today’s fiercely competitive labor market, HR departments and staffing firms are grappling with unprecedented challenges in attracting and retaining top talent, leading to the emergence of a striking new approach that transforms traditional recruitment into a captivating “dream home” prize competition. This strategy offers new hires and existing employees a chance to win