Friday, April 25, 2025
HomeAPTChinese "Salt Typhoon" Hackers Exploit Exchange Vulnerabilities to Target Organizations

Chinese “Salt Typhoon” Hackers Exploit Exchange Vulnerabilities to Target Organizations

Published on

SIEM as a Service

Follow Us on Google News

The Chinese Advanced Persistent Threat (APT) group known as Salt Typhoon, also referred to as FamousSparrow, GhostEmperor, Earth Estries, and UNC2286, has been actively targeting critical sectors worldwide.

This group has been particularly focused on telecommunications and government entities across the United States, the Asia-Pacific region, the Middle East, and South Africa since at least 2019.

Salt Typhoon is known for its sophisticated cyberespionage capabilities and extensive experience in illicit activities, employing multiple backdoors and hacking tools to maintain persistent access while minimizing detection.

- Advertisement - Google News

Exploitation Techniques and Targets

Salt Typhoon has been observed exploiting vulnerabilities such as Microsoft Exchange’s ProxyLogon, which allows attackers to take over Exchange servers without requiring valid credentials.

This pre-authenticated Remote Code Execution (RCE) exploit chain is particularly dangerous as it enables attackers to gain full control over any reachable Exchange server.

The group also leverages public cloud and communication services like GitHub, Gmail, AnonFiles, and File.io to covertly exchange commands and exfiltrate stolen data.

Additionally, Salt Typhoon employs PowerShell downgrade attacks to bypass Windows Antimalware Scan Interface (AMSI) logging, further complicating detection efforts.

Adversary Emulation and Defense Strategies

To counter these threats, AttackIQ has developed an assessment template that emulates Salt Typhoon’s Tactics, Techniques, and Procedures (TTPs).

This template allows organizations to validate their security controls and assess their ability to defend against such sophisticated threats.

Key techniques emulated include execution methods like PowerShell and Visual Basic scripting, persistence techniques such as registry modifications, and defense evasion strategies like disabling security software.

By focusing on these critical TTPs, organizations can enhance their security posture and improve detection and prevention capabilities against Salt Typhoon’s espionage operations.

The use of this assessment template is crucial for organizations to evaluate their security control performance against recently active Chinese APT activity.

It also helps in assessing the security posture against adversaries focused on the government and telecommunications sectors.

Continuous validation of detection and prevention pipelines is essential in mitigating the risks posed by Salt Typhoon’s global espionage operations.

By prioritizing the detection and mitigation of specific techniques like DLL side-loading and scheduled tasks, organizations can significantly reduce their vulnerability to these attacks.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...