Educational & easy-to consume visual guides to understanding attacks & enhancing resilience
The Salt Typhoon cyber espionage campaign has been making shocking headlines around the world, but especially in the US. This sophisticated, allegedly state-backed operation has been targeting critical infrastructure, government agencies, and key industries worldwide. Security researchers have linked this campaign to advanced persistent threat (APT) actors leveraging stealthy techniques to infiltrate and persist within high-value networks.
The campaign focused on long-term cyber espionage has been using stealthy intrusion methods, and data exfiltration to support geopolitical and economic agendas. Hackers associated with the campaign managed to break into some of the biggest US internet providers and data of millions has apparently been compromised. According to news reports, Salt Typhoon threat actors also targeted the phones of Donald Trump and Kamala Harris during the recent US elections
We've tried to make sense of everything that has gone down since the Nation-State actors have tried to establish their foothold in critical US infrastructure with our Salt Typhoon Cyber Attack Timeline.
From spear phishing campaigns to exploitation of zero-day vulnerabilities, the hackers have been using a variety of Tactics and Techniques in pursuit of sensitive information over the last few months.
Our Detailed Cyber Attack Timeline encapsulates, in depth, these series of incursions. The Salt Typhoon Cyber Attack Timeline summary is a visual representation of the key events, impact and actions taken in this massive cyber espionage campaign.
Disclaimer: This document has been created with the sole purpose of encouraging discourse on the subject of cybersecurity and good security practices. Our intention is not to defame any company, person or legal entity. Every piece of information mentioned herein is based on reports and data freely available online. Cyber Management Alliance neither takes credit nor any responsibility for the accuracy of any source or information shared herein.
We offer a host of courses including our NCSC Assured Training in Cyber Incident Planning and Response and our NCSC Assured Training in Building and Optimising Incident Response Playbooks.
Hands On, full-support 'Security As a Service', specifically designed for organisations that require access to experienced cybersecurity, governance, risk and compliance professionals.
A unique, affordable, subscription-based, cybersecurity service for small to medium businesses, offering 280+ services in cybersecurity.
Scenario-based, verbally-simulated tabletop attack exercises that test your organisation's ability to effectively respond to a cyber-attack.