threatintel
actor tracker
All actors

Salt Typhoon

salt-typhoon · primary source: Microsoft · first observed 2018
CN · ChinaState-sponsoredHigh confidencelast cited Aug 26, 2025 · 9mo ago

PRC state-backed actor responsible for the 2024 intrusions into U.S. commercial telecommunications providers — among the most consequential telecom-targeted operations on the public record. Operates against ISP and telecom network infrastructure to enable lawful-intercept abuse and broad collection against U.S. policy and political targets. CISA and the FBI confirmed the campaign in joint guidance throughout late 2024 and early 2025.

Aliases

GhostEmperorOtherUNC2286MandiantFamousSparrowOther

Motivations

espionagecollection

Target sectors

telecommunicationsispgovernment

Target countries

US

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Salt Typhoon
  • China
  • espionage
  • collection
Infrastructure
Victim
  • telecommunications
  • isp
  • government
  • US

MITRE ATT&CK techniques

Timeline

2 events

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
MD5
eba9ae70d1b22de67b0eba160a6762d8
MD5 of `cmd3`, a Linux/Go SFTP staging client paired with `cmd1` in Salt Typhoon intrusions. Listed in Table 4 of the joint AA25-239A advisory; written by the same developer as `cmd1` based on shared Go build paths (`C:/work/sync/cmd/...`).
Aug 26, 2025CISA / NSA / FBI
SHA-256
f2bbba1ea0f34b262f158ff31e00d39d89bbc471d04e8fca60a034cabe18e4f4
SHA-256 of `cmd1`, a Linux/Go custom SFTP client used by the Salt Typhoon / GhostEmperor cluster to stage and exfiltrate encrypted archives. Listed in Table 5 of the September 2025 joint advisory `Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System` (AA25-239A).
Aug 26, 2025CISA / NSA / FBI
MD5
7394229455151a9cd036383027a1536b
family · Demodex
MD5 of the Demodex kernel-mode rootkit driver published by Kaspersky in the September 2021 disclosure that originally named the actor `GhostEmperor` - the cluster now publicly tracked by U.S. agencies as Salt Typhoon. Loaded by bypassing Driver Signature Enforcement via the signed Cheat Engine driver `dbk64.sys`.
Sep 29, 2021Kaspersky (Securelist)

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Salt Typhoon — actor profile. Retrieved from https://threatintel.local/actors/salt-typhoon

latest cited activity · 2025-08-27 · 3 cataloged indicators