Salt Typhoon's Cyber Smackdown: Beijing's Spicy Router Raids Leave US Sizzling

EPISODE · Sep 1, 2025 · 3 MIN

Salt Typhoon's Cyber Smackdown: Beijing's Spicy Router Raids Leave US Sizzling

from Dragon's Code: America Under Cyber Siege · host Inception Point AI

This is your Dragon's Code: America Under Cyber Siege podcast. Alright listeners, Ting here—your favorite cyber sleuth with just the right mix of VPN and spicy hotpot. Let’s get right to it: the past few days have been a master class in digital drama, with Chinese hacker group Salt Typhoon running the country’s equivalent of a cyber hurricane across the U.S. infrastructure—powered by none other than Beijing’s own intelligence apparatus, according to joint reports from the National Security Agency, FBI, and pretty much every Western cyber agency that owns a suit. Salt Typhoon’s latest campaign isn’t just a rerun of last year’s telco snooping—they took things full Bond villain by zeroing in on America’s backbone routers, provider edge, and even customer edge routers. They wormed in through security vulnerabilities, often in edge devices like routers and switches, and once inside, let’s just say they didn’t pack lightly. According to Brett Leatherman at the FBI Cyber Division, their tactics allowed real-time interception of calls, texts, and even the geo-location of millions of subscribers. Major victims reportedly include AT&T, T-Mobile, and Verizon, and—brace yourselves—these intrusions may have compromised communications linked to recent presidential candidates. Salt Typhoon isn’t acting alone. They farmed out tech support to Chinese contractors like Sichuan Juxinhe Network Technology and Beijing Huanyu Tianqiong Information Technology—firms named and shamed in Treasury sanctions earlier this year. Microsoft even took the rare step of shifting Pentagon cloud contracts away from Chinese engineers—a gutsy move, but necessary when dealing with adversaries known for persistent, state-aligned espionage. How do we know Beijing is pulling the strings? Not only is the scale breathtaking—over 80 countries hit and 200-plus U.S. companies breached—but the tradecraft screams government work. These hackers didn’t just smash and grab; they installed digital trapdoors and altered router OS code to build a long-term base, capable of future sabotage. Allied intelligence from the UK, Germany, Japan, and nearly a dozen more agencies back up the attribution, emphasizing just how united—and worried—the West is. Big cyber advisory meetings, like the one chaired this week by Oh Hyun-joo in Korea’s National Security Office, focused on shoring up defenses against AI-driven threats and tightening public-private partnerships. U.S. agencies pushed out urgent bulletins advocating basic hygiene—patch those routers, activate multi-factor, and log every suspicious blip. But here’s the rub: experts like Annie Fixler at the Foundation for Defense of Democracies warn that chasing Salt Typhoon off your network is like trying to shake glitter out of a carpet. Their persistence and lateral movement skills mean they’re often already in deeper than you think. What have we learned? First, infrastructure must be monitored and micro-segmented. Second, foreign dependencies—even at th This content was created in partnership and with the help of Artificial Intelligence AI.

NOW PLAYING

Salt Typhoon's Cyber Smackdown: Beijing's Spicy Router Raids Leave US Sizzling

0:00 3:59

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Managing Next Generation Energy Systems Cambridge University Background Stakeholders working with energy systems have to make complex decisions formulated from risk-based assessments about the future. The move towards more renewables in our energy systems complicates matters even further, requiring the development of an integrated power grid and continuous and steady transformation of the UK power system. Network flows must be managed reliably under uncertain demands, uncertain supply, emerging network technologies and possible failures and, further, prices in related markets can be highly volatile. Mathematicians working with engineers and economists, can make significant contributions to address such issues, by helping to develop fit-for-purpose models for next generation energy systems. These interdisciplinary approaches are looking to address a range of associated problems, including modelling, prediction, simulation, control, market and mechanism design and optimisation. This knowledge exchange workshop was part of the four months Res Scar(r)ed For Life pjwrench A nostalgic, banter-full and analytical delve into all the TV shows, movies, games, books, and other media that scared (and scarred!) us s***less when we were children in the 90s. Ranging from the infamous to the obscure, from The Wizard of Oz to The Demon Headmaster, from Tomb Raider to fairytales, we’ve offer up 2 classic pieces of entertainment to reminisce and wax lyrical. Enjoy! Make America Healthy Beth Shaw #healthylifestyle #podcast #wellness #interview #wellnesspodcast Disclaimer: The content of this podcast is for informational purposes only and should not be considered a substitute for medical treatment, or advice, and shall not make any health or medical-related decision based in whole or in part on anything contained in the site. The opinions expressed by the guests do not necessarily reflect the views of Beth Shaw or YogaFit. Deep True Crimes (S.H) S. Harlowe True Crime, Mystery, and a little bit of history thrown in. This is a community for people who are drawn to the darker side of things, who aren't afraid to hear honest opinions about difficult matters.
URL copied to clipboard!