Salt Typhoon, also known by aliases including Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, is an advanced persistent threat (APT) group specializing in cyberespionage activities.
Since at least 2020, this group has executed highly sophisticated cyberespionage campaigns globally. Known for its advanced malware arsenal and exploitation of zero-day vulnerabilities, Salt Typhoon has broadened its reach to include new industries, expanded geographies, and more aggressive tactics in 2023. This APT group's arsenal and operations demonstrate a commitment to stealth, persistence, and widespread compromise.
Since 2023, Salt Typhoon has affected over 20 organizations across the globe. Countries impacted include:
Image source: Trend Micro
Salt Typhoon now targets a wider range of industries, including technology, consulting, chemical, transportation, government agencies, and non-profit organizations, reflecting a highly opportunistic and strategic approach.
Salt Typhoon now targets a wider range of industries, including technology, consulting, chemical, transportation, government agencies, and non-profit organizations, reflecting a highly opportunistic and strategic approach.
Victims typically include government agencies and tech companies involved in innovation, defense, and critical national infrastructure. The targeted organizations often face advanced lateral movement tactics once compromised.
Compromises administrative accounts via credential theft or malware infection, often exploiting SMB or Windows Management Instrumentation (WMI).
Exploits vulnerabilities in widely used systems, including:
Deploys tools such as DLL sideloading and registry manipulations to gain system-level access.
Employs obfuscation techniques including the GhostSpider backdoor and "living-off-the-land" tactics with tools like WMIC.exe and PsExec, PowerShell downgrade attacks, and masquerading techniques to bypass detection.
Deploys stealers such as SnappyBee (Deed RAT) or custom stealers like TrillClient for harvesting credentials and browser data.
Performs domain trust discovery and network reconnaissance to map the victim environment.
Propagates malware using SMB and WMI commands, deploying backdoors across multiple machines.
Focuses on sensitive files (e.g., PDFs) and uses advanced techniques like SnappyBee to steal credentials and session tokens.
Deploys malicious payloads via Cobalt Strike, custom backdoors (e.g., Zingdoor or GhostSpider), and HemiGate.
Transfers collected data to external servers or services like AnonFiles, File.io, and public repositories.
Ensures persistence and removes evidence of infection by cleaning up existing malware after each operational round.
Compromises administrative accounts via credential theft or malware infection, often exploiting SMB or Windows Management Instrumentation (WMI).
Exploits vulnerabilities in widely used systems, including:
Deploys tools such as DLL sideloading and registry manipulations to gain system-level access.
Employs obfuscation techniques including the GhostSpider backdoor and "living-off-the-land" tactics with tools like WMIC.exe and PsExec, PowerShell downgrade attacks, and masquerading techniques to bypass detection.
Deploys stealers such as SnappyBee (Deed RAT) or custom stealers like TrillClient for harvesting credentials and browser data.
Performs domain trust discovery and network reconnaissance to map the victim environment.
Propagates malware using SMB and WMI commands, deploying backdoors across multiple machines.
Focuses on sensitive files (e.g., PDFs) and uses advanced techniques like SnappyBee to steal credentials and session tokens.
Deploys malicious payloads via Cobalt Strike, custom backdoors (e.g., Zingdoor or GhostSpider), and HemiGate.
Transfers collected data to external servers or services like AnonFiles, File.io, and public repositories.
Ensures persistence and removes evidence of infection by cleaning up existing malware after each operational round.
List of the Detections available in the Vectra AI Platform that would indicate a cyberattack.
Salt Typhoon targets technology, consulting, chemical, transportation, government, and non-profits.
New additions include GhostSpider backdoor, SnappyBee stealer, and the Demodex Rootkit.
They use living-off-the-land techniques and advanced rootkits like Demodex.
Recent exploits include vulnerabilities in Ivanti Connect Secure, Sophos Firewall, and Microsoft Exchange.
Stolen data is uploaded to AnonFiles, File.io, or sent via encrypted emails.
There are overlaps with Chinese APTs such as FamousSparrow and other government-linked entities.
Monitor for unusual PowerShell commands, DLL sideloading, and Cobalt Strike beacons.
Salt Typhoon exploits contractor machines to infiltrate multiple organizations through trusted supply chain relationships.
Deploy endpoint detection tools, enforce patch management, and monitor traffic for known C&C patterns.
Collaborative intelligence sharing and unified strategies are essential for mitigating the growing threat.