Salt Typhoon: How Nine Telcos Were Compromised

One year of Hackers Roadmaps

Find Threat Talks on

Salt Typhoon: How Nine Telcos Were Compromised

Exposing the Vulnerabilities and Fallout

In this episode, we cover:
πŸ“‘ How known vulnerabilities in telco infrastructure were exploited.
πŸ“‘ The types of stolen data, including call detail records (CDRs) and surveillance data.
πŸ“‘ What the breach reveals about lawful interception systems and inherent risks.
πŸ“‘ Practical steps for organizations to strengthen defenses, including segmentation and Zero Trust strategies.

Explore the anatomy of this attack and learn actionable strategies to protect your organization against similar threats.

 

Explore 2024’s hacks in detail

Find a complete overview of all attacks featured in 2024.

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO
ON2IT

Jeroen Scheerder, ON2IT

Jeroen Scheerder

Security Architect
ON2IT

Rob Maas, Field CTO, ON2IT

Rob Maas

Field CTO
ON2IT

Episode details

In this episode of Threat Talks Deep Dive, we take a closer look at the Salt Typhoon cyberattack, a sophisticated breach that targeted nine major telecom providers and exposed sensitive surveillance data and call detail records (CDRs).

Host Lieuwe Jan Koning is joined by ON2IT’s Rob Maas and Jeroen Scheerder to analyze how attackers exploited known vulnerabilities, leveraged insufficient network segmentation, and manipulated lawful interception systems to access highly sensitive information. The discussion delves into the risks posed by embedded backdoors in telecom infrastructure and highlights the importance of adopting proactive defense strategies, such as Zero Trust architectures and rapid patching of vulnerabilities. The team also explores the broader implications for both organizations and individuals, offering practical advice on safeguarding communications through end-to-end encryption and maintaining vigilance in the face of persistent cyber threats.

Β 

Best way to support Threat Talks

Watch now to gain valuable insights and ensure your organization is ready for the challenges and opportunities of the digital future and don’t forget like and subscribe to our channels!

One year of Hackers Roadmaps

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

9 + 10 =

Christmas Hacker