Salt Typhoon Exploits Cisco Zero-Day to Breach Canadian Telecom

by | Jun 24, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

The Canadian Centre for Cyber Security (Cyber Centre) and the FBI have confirmed that the Chinese state-sponsored hacking group known as Salt Typhoon is actively targeting Canadian telecommunications firms. The campaign, which mirrors recent attacks on U.S. broadband providers, has already led to the compromise of at least one major Canadian telecom operator.

February Breach Exploited Unpatched Cisco Flaw

According to a joint advisory, Salt Typhoon breached a Canadian telecommunications provider in mid-February 2025 by exploiting CVE-2023-20198 — a critical vulnerability in Cisco IOS XE. This flaw, first disclosed in October 2023, allows unauthenticated remote attackers to create arbitrary administrative accounts and take full control of network devices.

Despite widespread warnings and the availability of patches, the affected telecom provider had not remediated the issue. This oversight provided Salt Typhoon with a straightforward path to compromise.

“Three network devices registered to a Canadian telecommunications company were compromised by likely Salt Typhoon actors in mid-February 2025,” the advisory reads.
“The actors exploited CVE-2023-20198 to retrieve the running configuration files from all three devices and modified at least one of the files to configure a GRE tunnel, enabling traffic collection from the network.”

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Escalating Threat After Prior Warnings

The breach follows a wave of reconnaissance activity observed in October 2024, after Salt Typhoon successfully infiltrated multiple U.S. broadband providers. At that time, Canadian authorities issued warnings and urged critical infrastructure operators to strengthen their defenses. However, this latest incident suggests that not all organizations took necessary precautions.

The Cyber Centre warns that Salt Typhoon’s targeting of Canadian entities is likely to continue over the next two years, with threat activity extending beyond telecommunications to multiple other sectors, including supply chain vendors and managed service providers (MSPs).

Espionage Motives and Attack Tactics

Telecommunication companies are prime targets for state-sponsored actors due to the high-value data they manage — including call metadata, subscriber location information, SMS content, and government or political communications.

Salt Typhoon’s operations typically focus on:

  • Edge devices at the network perimeter (e.g., routers, firewalls, VPN appliances)
  • Service providers (e.g., MSPs, cloud vendors) for indirect access to customer networks

Their tactics frequently start with reconnaissance, but stolen configuration data can enable lateral movement, traffic interception, and supply chain compromise.




Global Impact

Salt Typhoon’s activities have already impacted telecom giants in dozens of countries, including:

  • AT&T
  • Verizon
  • Lumen
  • Charter Communications
  • Consolidated Communications
  • Windstream
  • Viasat (which confirmed a breach last week, though no customer data was exposed)


Call to Action: Patch and Harden Now

The Cyber Centre is urging all critical infrastructure operators — especially telecommunications and network service providers — to:

  • Patch all known vulnerabilities on edge devices without delay
  • Review and harden device configurations using vendor and government guidance
  • Monitor for unusual activity, including unauthorized administrative accounts and GRE tunnel configurations

A list of hardening resources has been included in the Cyber Centre’s bulletin to assist operators in protecting their environments.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This