FBI: China’s Salt Typhoon Hackers Breached Over 200 US Companies

📅 Published: 8/27/2025
🔄 Updated: 8/27/2025, 10:10:45 PM
📊 15 updates
⏱️ 10 min read
📱 This article updates automatically every 10 minutes with breaking developments

The FBI has revealed that the Chinese state-linked hacking group known as Salt Typhoon breached over **200 U.S. companies**, including major telecommunications providers, data centers, and media giants, in a sprawling cyberespionage campaign targeting critical infrastructure and sensitive communications networks. This campaign, active over multiple years, has compromised a wide range of sectors, exposing call data logs, private communications, and court-ordered law enforcement wiretap request systems[1][3][4].

Salt Typhoon initially gained public attention last year whe...

Salt Typhoon initially gained public attention last year when it was discovered infiltrating at least nine major U.S. telecom firms, exploiting vulnerabilities in Cisco networking equipment to install persistent backdoors and traffic collection tunnels. The group used critical flaws in Cisco IOS XE software to access and modify network device configurations, enabling interception of sensitive telecommunications data across the U.S. and allied countries such as Canada, the U.K., South Africa, and others[1][5]. The FBI and Canadian cybersecurity authorities jointly issued warnings about these exploits, highlighting the sophisticated nature of the intrusions[5].

Beyond telecoms, U.S. agencies identified that Salt Typhoon’...

Beyond telecoms, U.S. agencies identified that Salt Typhoon’s reach likely extends to major data center operator Digital Realty and media conglomerate Comcast, suggesting the hackers have embedded themselves deeper into the infrastructure that supports broad swaths of internet and communications services[4]. The National Security Agency and Cybersecurity and Infrastructure Security Agency have assessed these expansions, underscoring the severity and scale of the threat.

Although FBI leadership recently indicated that Salt Typhoon...

Although FBI leadership recently indicated that Salt Typhoon’s presence in networks is currently “largely contained” and “dormant,” officials cautioned that the hackers remain a significant threat with potential to pivot from espionage to disruptive or destructive actions in a conflict scenario. The group’s access could also be leveraged for intellectual property theft or brokered access to other malicious actors[2].

The U.S., along with 12 allied nations—including all members...

The U.S., along with 12 allied nations—including all members of the Five Eyes intelligence alliance plus key European and Asian partners—issued a joint advisory on August 27, 2025, warning that this ongoing China-backed campaign targets telecommunications, lodging, transportation, and other critical sectors worldwide. The advisory highlighted the attackers’ ability to track communications, movements, and operations globally through stolen data and network intrusions[3].

The FBI is actively seeking public tips and information to i...

The FBI is actively seeking public tips and information to identify individuals involved in Salt Typhoon and disrupt their activities. The bureau remains committed to protecting U.S. telecommunications and critical infrastructure from these sophisticated cyber threats, emphasizing the need for vigilance and coordinated international response to counter such state-sponsored espionage campaigns[1].

In summary, Salt Typhoon represents a broad, multi-year Chin...

In summary, Salt Typhoon represents a broad, multi-year Chinese cyberespionage effort that has compromised over 200 U.S. companies, particularly in telecommunications and critical infrastructure, with ongoing risks of further malicious exploitation. The FBI and allied agencies continue to monitor, contain, and mitigate this significant cybersecurity threat to national and global networks.

🔄 Updated: 8/27/2025, 7:50:29 PM
The FBI revealed China’s Salt Typhoon hackers breached over 200 U.S. companies, expanding from nine major telecom providers to include data centers and residential internet providers like Comcast and Digital Realty, significantly broadening the competitive landscape of cyber espionage targets[1][4]. This expansion threatens to reshape industry defense priorities, as Salt Typhoon’s access to critical infrastructure could pivot from espionage to disruptive actions, increasing insider risks and potential intellectual property theft across sectors[2]. The global scale of the campaign, spanning 80 countries, underscores a sophisticated, state-backed effort reshaping how U.S. companies must defend sensitive communications and infrastructure[3].
🔄 Updated: 8/27/2025, 8:00:29 PM
The FBI revealed that China’s Salt Typhoon hackers have breached over 200 U.S. companies, a significant expansion from the initially known nine telecommunications providers targeted. This widespread compromise, including major firms like AT&T, Verizon, Lumen, Charter Communications, Comcast, and Digital Realty, is reshaping the competitive landscape by exposing critical infrastructure and communication networks to persistent espionage risks, potentially threatening U.S. market leadership in telecommunications and data services[1][4]. FBI Assistant Director Brett Leatherman warned that the threat is ongoing and poses long-term risks, including intellectual property theft and potential pivoting from espionage to destructive cyber actions, which could alter industry dynamics drastically[1][2].
🔄 Updated: 8/27/2025, 8:10:28 PM
The FBI, joined by nearly two dozen international agencies, issued a detailed advisory on August 27, 2025, describing the Salt Typhoon Chinese hacking campaign that breached over 200 U.S. companies and targets routers to siphon sensitive data[1]. FBI Assistant Director Brett Leatherman emphasized the ongoing threat, prompting calls for enhanced cybersecurity measures across critical infrastructure and telecommunications sectors[1][5]. The government response includes technical guidance to identify intrusions and urges businesses to strengthen network defenses amid this broad espionage operation[1].
🔄 Updated: 8/27/2025, 8:20:34 PM
The FBI revealed that China’s Salt Typhoon hacking group has breached over 200 U.S. companies, including major telecoms like AT&T, Verizon, Lumen, Charter Communications, and Windstream, marking a significant expansion in its cyberespionage campaign[1]. This large-scale infiltration has altered the competitive landscape by exposing critical telecom infrastructure, potentially giving Chinese intelligence unprecedented insight into U.S. communications networks and prompting heightened cybersecurity measures and strategic shifts among U.S. firms across sectors[1][2]. The breach’s scale and sophistication have intensified concerns about the vulnerability of key U.S. industries and spurred international collaboration to counteract China-backed cyber threats[2].
🔄 Updated: 8/27/2025, 8:30:34 PM
Consumer and public reaction to the FBI’s announcement that China’s Salt Typhoon hackers breached over 200 U.S. companies has been one of heightened concern and calls for stronger cybersecurity measures. Many Americans expressed alarm over the breach targeting sensitive communications, with some heeding FBI advice to switch to encrypted messaging apps to protect their privacy. Cybersecurity experts and officials emphasized the ongoing threat, warning that such widespread hacks undermine trust in critical infrastructure and corporate security[1].
🔄 Updated: 8/27/2025, 8:40:36 PM
The FBI revealed that China’s Salt Typhoon hacking group breached over 200 U.S. companies spanning telecommunications, government, transportation, and lodging sectors, marking the largest known telecom breach in U.S. history, with victims including AT&T, Verizon, Lumen, Charter Communications, and Windstream[1][2]. Cybersecurity experts emphasize the ongoing threat, with Madhu Gottumukkala of CISA highlighting the campaign’s use of compromised routers to siphon sensitive network traffic and urging organizations to patch known vulnerabilities and secure “edge” devices to mitigate risks[2]. Allied cybersecurity agencies warn that this multi-year espionage effort supports Chinese intelligence in tracking communications and movements globally, underscoring the broad impact and sophisticated nature of the operation
🔄 Updated: 8/27/2025, 8:50:34 PM
The FBI revealed that China’s Salt Typhoon hackers have breached over 200 U.S. companies across more than 80 countries, expanding far beyond the initial nine telecom firms previously identified. This widespread intrusion notably includes sectors such as government, transportation, lodging, and military, signaling a substantial shift in the competitive landscape by compromising critical infrastructure and potentially disrupting market dynamics. Acting Cybersecurity and Infrastructure Security Agency Director Madhu Gottumukkala emphasized the urgency, stating, “By exposing the tactics used by PRC state-sponsored actors and providing actionable guidance, we are helping organizations strengthen their defenses and protect the systems that underpin our national and economic security”[1][2].
🔄 Updated: 8/27/2025, 9:00:39 PM
China’s Salt Typhoon hacking group, linked to the Chinese Ministry of State Security, has breached over 200 U.S. companies and infiltrated organizations across more than 80 countries, targeting critical infrastructure and telecommunications systems in a broad cyber espionage campaign, U.S. and 12 allied countries warned in a joint advisory on August 27, 2025[1][4]. The advisory, co-issued by the FBI, NSA, and agencies from allies including the U.K., Australia, Germany, Japan, and Spain, highlighted the global impact of these intrusions and urged strengthened defenses against the sophisticated attacks that threaten international communications and logistics networks[1]. Allies described the stolen data as enabling Chinese intelligence to track targets worldwide, illustrating the campaign’s
🔄 Updated: 8/27/2025, 9:10:40 PM
The FBI disclosed that the China-backed Salt Typhoon hacking group has breached over 200 U.S. companies across more than 80 countries, expanding beyond telecommunications to sectors including government, transportation, lodging, and military[1][2]. Technical analysis reveals the hackers exploited vulnerabilities in edge devices like routers to gain network access, decrypt network traffic, and steal administrator credentials, enabling deep espionage capabilities such as tracking communications and movements globally[1][2]. U.S. and allied agencies recommend patching known exploited vulnerabilities and strengthening defenses of critical infrastructure to mitigate this sophisticated, multi-year cyberespionage campaign[1][2].
🔄 Updated: 8/27/2025, 9:20:42 PM
China’s Salt Typhoon hacking group has breached over 200 U.S. companies and infiltrated networks in more than 80 countries, targeting sectors including telecommunications, government, transportation, lodging, and military infrastructure, according to the FBI and allied cybersecurity agencies[1][2][3]. In a rare unified international response, 13 countries—including the U.S., U.K., Canada, Australia, Germany, Japan, and others—issued a joint advisory outlining the hackers’ tactics and recommended mitigation strategies to strengthen global defenses against this ongoing espionage campaign[3][4]. FBI Assistant Director Brett Leatherman warned the threat remains active, underscoring the broad geopolitical implications of China’s extensive cyber spying operation[1].
🔄 Updated: 8/27/2025, 9:30:44 PM
The U.S. government, alongside 12 allied nations, responded to the Salt Typhoon hacking campaign by issuing a joint advisory detailing attacker techniques and recommending mitigation strategies, reflecting a coordinated international cybersecurity effort. The FBI confirmed notifying at least 600 organizations, including over 200 in the U.S., about potential breaches linked to the Chinese state-backed hackers, while agencies such as the Cybersecurity and Infrastructure Security Agency, NSA, and the Department of Defense Cyber Crime Center co-led the response[1][2]. Senate Intelligence Committee Chair Ron Wyden has called for a review of the U.S. court systems’ cybersecurity posture following breaches linked to this group[2].
🔄 Updated: 8/27/2025, 9:40:48 PM
The FBI revealed that China’s Salt Typhoon hackers have breached over 200 U.S. companies across multiple sectors, dramatically expanding from the previously known nine telecommunications firms. This widespread infiltration, targeting critical infrastructure and senior officials' call records, significantly intensifies competitive pressures on U.S. companies to bolster cybersecurity and protect proprietary and sensitive communications[1][2][3]. FBI Assistant Director Brett Leatherman described the threat as "ongoing," signaling persistent challenges in the competitive landscape for affected industries[1].
🔄 Updated: 8/27/2025, 9:50:46 PM
Experts warn that the FBI's revelation of China’s Salt Typhoon hacking campaign breaching over 200 U.S. companies signals a significant escalation in state-sponsored cyber espionage. Madhu Gottumukkala, acting director of CISA, emphasized that exposing the tactics of PRC-backed actors enables organizations to bolster defenses critical to national security[2]. Meanwhile, FBI Assistant Director Brett Leatherman highlighted the ongoing threat, noting the hackers’ sophisticated targeting of telecoms and sensitive call records, prompting urgent advisories for companies to patch vulnerabilities and secure edge devices like routers[1][2].
🔄 Updated: 8/27/2025, 10:00:44 PM
Consumer and public reaction to the FBI’s revelation that China’s Salt Typhoon hackers breached over 200 U.S. companies has been marked by heightened concern over privacy and national security. Some Americans have responded by adopting encrypted messaging apps as urged by the FBI to protect their communications, while cybersecurity experts emphasize the urgency of patching vulnerabilities to defend vital networks[1]. The scale of the breach, affecting companies across 80 countries and including major U.S. telecom providers, has fueled public anxiety about ongoing Chinese cyberespionage and calls for stronger government and corporate cybersecurity measures[1][2].
🔄 Updated: 8/27/2025, 10:10:45 PM
The FBI revealed that China's Salt Typhoon hackers have breached over 200 U.S. companies, significantly expanding the competitive threat to American telecommunications and internet sectors, including major players like AT&T, Verizon, and Lumen[1]. This widespread infiltration disrupts the competitive landscape by compromising critical network infrastructure, enabling China to intercept call records and communications, which could undercut trust and market positioning of affected firms[1][2]. With the campaign spanning 80 countries, U.S. companies face intensified challenges in securing sensitive data, potentially accelerating shifts towards encrypted communications and stronger cybersecurity investments to maintain competitive parity[1][2].
← Back to all articles

Latest News