Logo
  • Home
  • My News Page
  • Online Security Store
    • Cyber Security Page 1
      • Acronis International
      • Avast internet security
      • AVG Antivirus
      • Avira Cyber security
      • Bitdefender Security
      • ESET Security
      • F-Secure Internet security
      • G-DATA Security
    • Cyber Security Page 2
      • kaspersky
      • K7 Antivirus
      • Malwarebytes:
      • McAfee Antivirus
      • Nord Security
      • Norton Security Software
      • Sucuri Website Security
      • Surfshark Security
      • Trend Micro
      • vipre security group
    • PC Health & Boost Software
      • Abelssoft digital software
      • Advanced System Repair
      • AOMEI Software
      • Ashampoo Software
      • Auslogics PC Software
      • EaseUS Software
      • CCleaner registry Software
      • ClevGuard Parental Control
      • iMobie
      • Iobit Software
      • Iolo System Mechanic
      • O&O Software:
      • Passware:
    • MacOS Software.
    • Microsoft software
    • Reolink systems
      • Reolink-Poe IP Cameras & NVRs
      • Reolink: Accessories
    • Rexingusa security
    • SimpliSafe Home Security
    • VPN Security + Password Managers
  • Terms of Use
  • Cookie Policy (EU)
  • Terms and Conditions
Logo
  • Home
  • My News Page
  • Online Security Store
    • Cyber Security Page 1
      • Acronis International
      • Avast internet security
      • AVG Antivirus
      • Avira Cyber security
      • Bitdefender Security
      • ESET Security
      • F-Secure Internet security
      • G-DATA Security
    • Cyber Security Page 2
      • kaspersky
      • K7 Antivirus
      • Malwarebytes:
      • McAfee Antivirus
      • Nord Security
      • Norton Security Software
      • Sucuri Website Security
      • Surfshark Security
      • Trend Micro
      • vipre security group
    • PC Health & Boost Software
      • Abelssoft digital software
      • Advanced System Repair
      • AOMEI Software
      • Ashampoo Software
      • Auslogics PC Software
      • EaseUS Software
      • CCleaner registry Software
      • ClevGuard Parental Control
      • iMobie
      • Iobit Software
      • Iolo System Mechanic
      • O&O Software:
      • Passware:
    • MacOS Software.
    • Microsoft software
    • Reolink systems
      • Reolink-Poe IP Cameras & NVRs
      • Reolink: Accessories
    • Rexingusa security
    • SimpliSafe Home Security
    • VPN Security + Password Managers
  • Terms of Use
  • Cookie Policy (EU)
  • Terms and Conditions
    2025-04-26
    alt=A hooded figure sits at a laptop, silhouetted against the red background of the Chinese flag featuring yellow stars.
    Cyber security

    Stefanie Schappert

    Stefanie Schappert

    Senior Journalist

    The Federal Bureau of Investigation on Friday announces a $10 million reward for information on Salt Typhoon, the China-backed hacking group responsible for targeting several US telecoms, as well as the US Treasury.

    The agency said it is especially interested in any information that could help identify the specific individuals behind the campaign or about its operations targeting the telecommunications sector.

    “Investigation into these actors and their activity revealed a broad and significant cyber campaign to leverage access into these networks to target victims on a global scale,” the FBI said in its announcement.

    Cybersecurity insiders have identified Salt Typhoon as a known nation-state adversary and Advanced Persistent Threat (APT) group sponsored by the Chinese government.

    The nation-state threat actor made headlines last September after the US government discovered the group had breached the nation’s commercial telecoms infrastructure, including major companies such as Verizon, AT&T, T-Mobile, and Lumen Technologies.

    The FBI said it is aggressively committed to identifying, mitigating, and disrupting Salt Typhoon’s malicious cyber activity. “If you have information about Salt Typhoon, we want to hear from you,” the FBI posted on X, in both English and Chinese.

    The group was able to obtain “call data logs, a limited number of private communications, and select information subject to court-ordered US law enforcement requests,” the FBI said.

    The phone records of then-President-elect Donald Trump and vice presidential running mate, Ohio Senator JD Vance, as well as some Kamala Harris campaign staffers, were all targeted by the group in the lead-up to the 2024 presidential election.

    What’s more, the FBI said that the People’s Republic of China (PRC)-linked threat actors had been lurking in several of the telecom providers for an undetermined amount of time – and likely still remain.

    Salt Typhoon is said to be highly sophisticated and uses anti-forensic and anti-analysis techniques, allowing the group to go undetected for months. The group is thought to have been operating in 2020.

    Also known as GhostEmperor and FamousSparrow, experts warn the malicious campaign appears to be a part of China’s ongoing cyber efforts to infiltrate US critical infrastructure. China has repeatedly denied any allegations of its involvement.

    Salt Typhoon is also believed to be behind the hack of the US Treasury Department, discovered in February, in which threat actors gained access to the laptops of some senior officials.

    Anyone with information on Salt Typhoon can file a report with the FBI’s Internet Crime Complaint Center (IC3) or contact your local FBI field office.

    In conjunction, the US State Department is also offering a $10 million reward for information about individuals engaging in cyber activities on behalf of foreign governments to target US critical infrastructure.

    US critical infrastructure, cybercrime investigation, Cybersecurity awareness, Salt Typhoon cyber campaign, Cyberwarfare, FBI cyber alert, Advanced Persistent Threat (APT), nation-state cyberattack, cybersecurity threat., telecom data theft, Salt Typhoon hackers, FBI reward, Chinese cyber espionage, PRC hacking group, telecommunications breach
    previous

    This Cyber Attack Targets Microsoft 365 Accounts

    next

    AI is getting “creepy good” at geo-guessing

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Trustpilot
    The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}

    Add Living safe online to your Homescreen!

    Add
    Verified by MonsterInsights