Skip to main content
  1. Blog/

Salt Typhoon and the Telecom Breach — Infrastructure Under Siege

·1036 words·5 mins
Osmond van Hemert
Author
Osmond van Hemert
Breaches & Zero-Days - This article is part of a series.
Part : This Article

This week, the scope of the Salt Typhoon cyberattack has become disturbingly clear. Multiple major US telecom providers — including AT&T, Verizon, T-Mobile, and Lumen Technologies — have confirmed breaches attributed to a Chinese state-sponsored hacking group. The attackers reportedly had access to call metadata, and in some cases actual communications, for months before detection. Federal investigations are ongoing, and the full extent of the compromise is still being assessed.

This isn’t your average data breach. This is a systematic penetration of the communications infrastructure that underpins American society. And it raises questions that every engineer building or maintaining critical systems needs to grapple with.

What We Know So Far
#

Salt Typhoon (also tracked as GhostEmperor and FamousSparrow by different security firms) is a Chinese advanced persistent threat (APT) group that has been operating since at least 2020. According to reporting from the Wall Street Journal and statements from CISA and the FBI, the group exploited vulnerabilities in telecom network infrastructure to gain persistent access.

The attack targeted systems used to comply with lawful intercept requirements — the CALEA (Communications Assistance for Law Enforcement Act) infrastructure that telecom providers are legally required to maintain. The cruel irony here is that backdoors built into telecom systems for lawful surveillance purposes became the attack vector for foreign espionage.

The metadata accessed reportedly includes call records: who called whom, when, for how long, and from where. For targeted individuals — reportedly including people involved in political campaigns — the access may have extended to actual call content and text messages.

The CALEA Paradox
#

For those of us who have followed the encryption and surveillance debates over the decades, Salt Typhoon is the nightmare scenario that security researchers have been warning about for years.

The argument for lawful intercept capabilities has always been: we need these access points for legitimate law enforcement purposes, and we can secure them adequately. The counterargument has always been: any intentional weakness in a system can be exploited by unintended actors. You cannot build a backdoor that only the good guys can use.

Salt Typhoon just proved the counterargument correct at a scale that’s hard to ignore. The very infrastructure built to enable authorized surveillance became the entry point for unauthorized surveillance by a foreign government.

This isn’t theoretical anymore. The next time someone proposes mandating encryption backdoors or expanding lawful intercept requirements, Salt Typhoon should be exhibit A for why that approach is fundamentally flawed. Security is not divisible — you cannot weaken a system for one purpose without weakening it for all purposes.

What This Means for Engineering Teams
#

Even if you’re not building telecom infrastructure, there are concrete lessons here:

Audit your compliance-mandated access points. If regulations require you to maintain monitoring, logging, or access capabilities, those are attack surfaces. Treat them with the same rigor you’d apply to any external-facing service. Segment them. Monitor them. Test them.

Persistent access is the real threat. Salt Typhoon reportedly maintained access for months. The initial breach matters less than the dwell time. Invest in detection capabilities that can identify anomalous access patterns over long time horizons, not just perimeter defenses.

Supply chain and infrastructure trust. Telecom infrastructure involves a complex web of vendors, protocols, and legacy systems. Many of the components in telecom networks were designed decades ago with different threat models. If you’re integrating with or depending on infrastructure you don’t fully control, you need to account for the possibility that it’s compromised.

Metadata is not “just metadata.” There’s a persistent myth that metadata — who communicated with whom, when, and where — is somehow less sensitive than content. Intelligence agencies know better. Metadata at scale reveals patterns, relationships, movements, and intentions. If your systems generate or store metadata, protect it accordingly.

The Geopolitical Dimension
#

Salt Typhoon exists in the context of an escalating cyber conflict between nation-states. The US has attributed similar campaigns to Chinese groups (Volt Typhoon targeting critical infrastructure, APT41 targeting a wide range of sectors) with increasing frequency. China denies involvement, as it always does.

What’s changed is the target selection. Previous campaigns focused on intellectual property theft or espionage against government agencies. Targeting telecom infrastructure — the backbone of civilian communication — represents an escalation. It’s the kind of capability you develop not just for intelligence gathering, but for potential disruption during a conflict.

For those of us in the tech industry, this is a reminder that cybersecurity isn’t just a technical problem. It’s a geopolitical reality that shapes the risk landscape for every system we build and operate.

The Response So Far
#

CISA and the FBI have issued advisories. Congress is holding briefings. The telecom companies are working with investigators. But the structural problem — that US telecom infrastructure is a patchwork of legacy and modern systems with mandated access points — isn’t going to be solved by any single response.

Senator Ron Wyden has already called for investigations into why CALEA systems were so vulnerable. The FCC is reportedly considering new cybersecurity requirements for telecom providers. These are steps in the right direction, but they’re also years overdue.

My Take
#

In thirty years of working in technology, I’ve watched the security landscape evolve from script kiddies and worms to nation-state operations targeting critical infrastructure. Salt Typhoon represents a maturation of offensive cyber capabilities that should make every infrastructure engineer uncomfortable.

The hardest lesson here is that our regulatory frameworks can create security vulnerabilities. Laws written with good intentions — enabling lawful surveillance — created the exact weakness that adversaries exploited. This should make us deeply skeptical of any proposal that intentionally weakens system security, regardless of the justification.

For those of us building systems today, the practical takeaway is to assume that any mandated access point, any monitoring capability, any administrative interface is a target. Design accordingly. Monitor accordingly. And push back — through appropriate channels — when regulations demand architectural decisions that compromise security.

The telecom industry is learning this lesson the hard way. Let’s make sure the rest of us learn it from their experience rather than our own.

This is part of my Security in Practice series, examining real-world security events and their implications for software engineering.

Breaches & Zero-Days - This article is part of a series.
Part : This Article