Salt Typhoon: How Nine Telcos Were Compromised
Find Threat Talks on
Salt Typhoon: How Nine Telcos Were Compromised
Exposing the Vulnerabilities and Fallout
In this episode, we cover:
π‘ How known vulnerabilities in telco infrastructure were exploited.
π‘ The types of stolen data, including call detail records (CDRs) and surveillance data.
π‘ What the breach reveals about lawful interception systems and inherent risks.
π‘ Practical steps for organizations to strengthen defenses, including segmentation and Zero Trust strategies.
Explore the anatomy of this attack and learn actionable strategies to protect your organization against similar threats.
Explore 2024’s hacks in detail
Find a complete overview of all attacks featured in 2024.
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO
ON2IT
Jeroen Scheerder
Security Architect
ON2IT
Rob Maas
Field CTO
ON2IT
Episode details
In this episode of Threat Talks Deep Dive, we take a closer look at the Salt Typhoon cyberattack, a sophisticated breach that targeted nine major telecom providers and exposed sensitive surveillance data and call detail records (CDRs).
Host Lieuwe Jan Koning is joined by ON2ITβs Rob Maas and Jeroen Scheerder to analyze how attackers exploited known vulnerabilities, leveraged insufficient network segmentation, and manipulated lawful interception systems to access highly sensitive information. The discussion delves into the risks posed by embedded backdoors in telecom infrastructure and highlights the importance of adopting proactive defense strategies, such as Zero Trust architectures and rapid patching of vulnerabilities. The team also explores the broader implications for both organizations and individuals, offering practical advice on safeguarding communications through end-to-end encryption and maintaining vigilance in the face of persistent cyber threats.
Β
Best way to support Threat Talks
Watch now to gain valuable insights and ensure your organization is ready for the challenges and opportunities of the digital future and don’t forget like and subscribe to our channels!
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
