Salt Typhoon
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1098 | .004 | Account Manipulation: SSH Authorized Keys |
Salt Typhoon has added SSH authorized_keys under root or other users at the Linux level on compromised network devices.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1110 | .002 | Brute Force: Password Cracking |
Salt Typhoon has cracked passwords for accounts with weak encryption obtained from the configuration files of compromised network devices.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1602 | .002 | Data from Configuration Repository: Network Device Configuration Dump |
Salt Typhoon has attempted to acquire credentials by dumping network device configurations.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1587 | .001 | Develop Capabilities: Malware |
Salt Typhoon has used custom tooling including JumbledPath.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1048 | .003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
Salt Typhoon has exfiltrated configuration files from exploited network devices over FTP and TFTP.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1590 | .004 | Gather Victim Network Information: Network Topology |
Salt Typhoon has used configuration files from exploited network devices to help discover upstream and downstream network segments.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Salt Typhoon has made changes to the Access Control List (ACL) and loopback interface address on compromised devices.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1070 | .002 | Indicator Removal: Clear Linux or Mac System Logs |
Salt Typhoon has cleared logs including .bash_history, auth.log, lastlog, wtmp, and btmp.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Salt Typhoon has used publicly available tooling to exploit vulnerabilities.(Citation: Cisco Salt Typhoon FEB 2025) |
Enterprise | T1021 | .004 | Remote Services: SSH |
Salt Typhoon has modified the loopback address on compromised switches and used them as the source of SSH connections to additional devices within the target environment, allowing them to bypass access control lists (ACLs).(Citation: Cisco Salt Typhoon FEB 2025) |
Software |
|||
ID | Name | References | Techniques |
---|---|---|---|
S1206 | JumbledPath | (Citation: Cisco Salt Typhoon FEB 2025) | Clear Linux or Mac System Logs, Network Sniffing, Multi-Stage Channels, Hide Infrastructure, Archive Collected Data, Impair Defenses |
References
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.