Monday 2 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

China’s Years-Long Salt Typhoon Hack Penetrates Military And Government Networks Worldwide

Officials say Chinese state-backed hackers have accessed military networks in more than 80 countries, exposing critical weaknesses in the systems that underpin global defence

Carly PagebyCarly Page
September 4, 2025
in News
Photo by Markus Spiske on Unsplash

Photo by Markus Spiske on Unsplash

Share on Linkedin

Chinese state-backed hackers have infiltrated government and military infrastructure networks worldwide in one of the most significant cyber-espionage campaigns ever uncovered.

You Might Also Like

Periphery and Midgard partner to secure robots against capture and reverse engineering

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Ukrspecsystems, one of the Ukraine’s big drone makers, opens a factory in the UK

The group, known as Salt Typhoon, exploited weaknesses in networks to gain persistent access to critical systems across more than 80 countries, intelligence and cybersecurity agencies from 13 countries have warned in a joint statement, raising serious concerns about the integrity of military communications and command networks.

“People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks,” the statement said.

The years-long campaign has been described by Western intelligence agencies as “indiscriminate” and “unprecedented” in scale. Officials believe that data relating to nearly all Americans may have been swept up in the intrusion, according to The New York Times, a reflection of just how deep the compromise ran through national telecoms infrastructure.

Salt Typhoon was first thrust into the spotlight in December 2024, when US officials disclosed that the group had pulled off what they called the worst cyber intrusion in the country’s history. The revelation that major telecom carriers and government-connected systems had been breached prompted urgent warnings in Washington and demands to treat the incident as a full-blown national security emergency.

Subsequent investigations have shown that the operation stretches back much further, with officials now believing that Salt Typhoon has been performing malicious operations globally since at least 2021.

The joint advisory, issued by the US, UK, Germany, Italy, Finland, Spain, Canada, Australia, Japan, and South Korea, said that by compromising backbone, provider-edge, and customer-edge routers, the China-backed attackers were able to establish footholds deep inside networks that support day-to-day communications and military infrastructure.

The advisory noted that once inside, Salt Typhoon could intercept voice and data traffic, collect metadata, and potentially monitor or disrupt military operations.

Investigators have linked the Salt Typhoon campaign to three China-based technology firms active since at least 2019, though the scale of their activities only came to light last year. (The three firms are not recognised names. They are Sichuan Juxinhe Network Technology Co. Ltd. (四川聚信和网络科技有限公司); Beijing
Huanyu Tianqiong Information Technology Co., Ltd. (北京寰宇天穹信息技术有限公司); and Sichuan Zhixin Ruijie Network Technology Co., Ltd. (四川智信锐捷网络科技有限公司.)

According to the joint statement, these three companies were working on behalf of both China’s intelligence services, including multiple units in the People’s Liberation Army and the Ministry of State Security, to conduct overseas operations.

This equipped Chinese intelligence services with “the capability to identify and track their targets’ communications and movements around the world,” according to the statement.

“We are deeply concerned by the irresponsible behaviour of the named commercial entities based in China that has enabled an unrestrained campaign of malicious cyber activities on a global scale,” Dr Richard Horne, chief executive of the UK’s National Cyber Security Centre, said in a statement sent to Resilience Media. “It is crucial organisations in targeted critical sectors heed this international warning about the threat posed by cyber actors, who have been exploiting publicly known – and so therefore fixable – vulnerabilities.”

The technical details revealed in the joint advisory, which highlights that Salt Typhoon has been exploiting common vulnerabilities in products from major IT suppliers Ivanti, Palo Alto Networks, and Cisco — these are named in the advisory — underline the scale of the task now facing militaries and their suppliers.

Defence ministries have been urged to adopt zero-trust principles across their IT and operational technology environments, enforce stricter segmentation between critical systems, and deploy active hunt teams to search for evidence of persistent access. (We are reaching out to the three IT companies and will update this post as we learn more.)

The campaign has also underscored the importance of allied collaboration. Intelligence-sharing across NATO members and partners in Asia has been credited with helping to piece together the scale of Salt Typhoon’s activity. Officials say that the same collaborative approach must now extend to hardening networks, particularly where military operations depend on commercial telecoms and satellite links.

In response to the joint statement, the Chinese Foreign Ministry pushed back, accusing the US and its allies of “smearing” China under the guise of cybersecurity and framing the campaign as a political stunt.

Spokesperson Guo Jiaku alleged that the Salt Typhoon narrative was built to justify increased US budgets and deflect attention from America’s own cyber-intrusion practices, and urged Washington to “reflect more on what it’s doing instead of forming small groupings to smear others.”

Tags: ChinaGuo JiakuNational Cyber Security CentreRichard Horne
Previous Post

Sola Raises $35M to Ramp Up Its AI-based Cybersecurity Tooling

Next Post

How Independent Are We When It Comes to Tech?

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

Periphery CEO Toby Wilmington

Periphery and Midgard partner to secure robots against capture and reverse engineering

byPaul Sawers
March 2, 2026

Modern conflict has pushed autonomous machines into some of the most hostile operating environments. Drones are intercepted mid-flight, ground robots...

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

byIngrid Lunden
February 27, 2026

German defence tech startups are seeing a lot of activity at the moment, and one of them is using that...

Ukrspecsystems, one of the Ukraine’s big drone makers, opens a factory in the UK

Ukrspecsystems, one of the Ukraine’s big drone makers, opens a factory in the UK

byIngrid Lunden
February 26, 2026

Ukrspecsystems, one of the bigger defence startups in Ukraine, has opened up a factory to  produce drones in the UK....

Europe’s Defence Renaissance Gets a VTOL Boost: STARK Launches AI-Enabled Strike Drone

Germany set to formally announce Stark and Helsing strike-drone contracts this week

byCarly Pageand1 others
February 25, 2026

Germany is expected to formally announce its strike-drone deal with defence startup Stark and Helsing on Thursday, sources tell Resilience...

Group 14 Technologies is betting on silicon batteries for super fast charging

Group 14 Technologies is betting on silicon batteries for super fast charging

byJohn Biggs
February 24, 2026

https://youtu.be/FE_FhVsSm10 For decades, silicon batteries were a pipe dream. The product, a cross between a standard lithium battery and a...

Frankenburg has raised up to $50M at a $400M valuation, say sources

Frankenburg confirms €30M funding to build more EU-made rockets

byJulia Gifford
February 24, 2026

Nearly a month after Resilience Media broke the news that Frankenburg Technologies had raised more funding, today the Baltics-based startup...

Tytan raises €30M for drone defence, sources say at a ~€150M valuation

Tytan raises €30M for drone defence, sources say at a ~€150M valuation

byIngrid Lunden
February 24, 2026

Drones have quickly become a cornerstone of modern warfare, and so has building better tools for those times when drones...

brown and black abstract painting

IQM, the quantum startup from Finland, plans US listing on Nasdaq at $1.8B valuation

byIngrid Lunden
February 23, 2026

IQM, the Finnish startup that has raised more than $570 million over the years to fuel its big ambition of...

Load More
Next Post
How Independent Are We When It Comes to Tech?

How Independent Are We When It Comes to Tech?

Stark Raises $62M For Its Strike Drones and UAV Control Systems, Offset Labs Secures Seed Funding For Its Defence and National Security AI Lab

Stark Raises $62M For Its Strike Drones and UAV Control Systems, Offset Labs Secures Seed Funding For Its Defence and National Security AI Lab

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Harmattan AI raises $200M at a $1.4B valuation from Dassault

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Frankenburg has raised up to $50M at a $400M valuation, say sources

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.