Skip to content
Salt Typhoon
OrganisationCN

Salt Typhoon

Chinese state-linked APT with confirmed ongoing compromise of 200+ telecoms firms in 80 countries as of August 2025.

Last refreshed: 17 April 2026 · Appears in 1 active topic

Key Question

Is Salt Typhoon still inside global telecoms networks, and what can carriers do about it?

Timeline for Salt Typhoon

#117 Apr
View full timeline →
Common Questions
Is Salt Typhoon still hacking telecoms companies in 2026?
Yes. An FBI official confirmed at CyberTalks 2026 in February 2026 that Salt Typhoon's telecoms compromise was 'still very, very much ongoing', with at least 200 companies in 80 countries affected as of August 2025.Source: FBI / CyberTalks 2026
What did Salt Typhoon actually access in US phone networks?
Salt Typhoon accessed call data records, real-time call interception capability for targeted individuals, and the CALEA lawful-intercept back-end systems at multiple US carriers including AT&T, Verizon and T-Mobile.Source: CISA / FBI joint advisory November 2024
How is Salt Typhoon different from Volt Typhoon?
Salt Typhoon targets telecommunications for SIGINT collection (intercepting calls and data). Volt Typhoon targets US critical infrastructure CNI for pre-positioning sabotage capability. Both are China-nexus but have different mission objectives.Source: CISA / NCSC

Background

Salt Typhoon is a China-linked threat actor attributed by US and allied agencies with large-scale persistent compromise of global telecommunications infrastructure. An FBI official confirmed at CyberTalks 2026 in February 2026 that the campaign was "still very, very much ongoing" and had affected at least 200 companies across 80 countries as of August 2025.

Salt Typhoon became publicly known in late 2024 when US intelligence disclosed that the actor had compromised multiple Major US telecoms carriers, including T-Mobile, AT&T and Verizon, gaining access to call data records (CDRs), real-time call interception capability for specific targets, and CALEA (Communications Assistance for Law Enforcement Act) lawful-intercept back-end systems. The latter, designed to allow lawful interception by US law enforcement, was accessed by the Chinese actors. The compromise scale was described by CISA director Jen Easterly in November 2024 as the "worst telecommunications hack in our nation's history".

The cross-topic significance is substantial. Salt Typhoon operates in the same Chinese state-nexus space as Volt Typhoon (CNI pre-positioning) and UNC5221 (BRICKSTORM enterprise espionage), suggesting a coordinated tri-vector Chinese cyber posture: SIGINT collection (Salt Typhoon), sabotage-ready positioning (Volt Typhoon), and long-duration economic espionage (UNC5221). For security operations teams in telecoms infrastructure organisations, the February 2026 FBI confirmation means the incident window extends well beyond the initial 2024 disclosure.