In this insane world, where things happen constantly, it is so easy to forget things, and forget to find out if we ever patched, fixed, remediated a thing that was big news. Not everything lies in our power to do, so doing our part for the things in our control is not just good practice, its civic duty.
I was in DC just a few weeks ago in Feb of 2026, and the topic of Salt Typhoon came up again. It’s not in public consciousness, and it’s certainly not making headlines, but for those of us who know how brittle the old networks are, we remain worried about the thing staying out there, unpatched with a new breach imminent any day.
Salt Typhoon is a name used by the cybersecurity industry for a China-linked espionage campaign that targets network infrastructure. It was described as a particular targeting observed since at least 2021 across sectors such as telecommunications, government, transportation, lodging, and military infrastructure. The reported objective centers on long-term access for intelligence collection rather than short, disruptive attacks.
In 2024, public reporting connected the campaign to compromises inside major United States telecommunications environments.
In September 2025, the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), and international partners published a joint advisory describing People’s Republic of China state-sponsored actors targeting networks globally, with emphasis on large backbone routers and edge devices used by telecommunications providers. The advisory explicitly notes overlap with industry reporting that uses the Salt Typhoon name.
After the campaign became publicly associated with telecommunications compromises, the response centered on three tracks: coordinated advisories, investigation and reporting channels, and hardening guidance focused on network devices.
Governments and intelligence partners issued joint guidance to help defenders identify malicious activity and apply mitigations. CISA’s joint advisory urged organizations to hunt for malicious activity and apply mitigations to reduce risk from these actors, with detailed focus on network infrastructure compromises.
The FBI requested public tips related to the campaign and the compromise of multiple United States telecommunications companies, directing submissions through official reporting channels.
There was broad consensus that the successful intrusion relied on known, common vulnerabilities and gaps in operational hygiene, especially delayed patching and weak protections for management access.
It turns out that while there were issued “best practice” guidelines, we remain woefully unaware of what data was stolen, how much data was exfiltrated, and which networks were collectively affected.
This is because many networks use older, unpatched devices with outdated security standards. We’re not talking about sophisticated complexities. We’re talking about systems that have been in place so long that people forget they aren’t up to date.
We’re talking about
Graphiant supports a defense posture by reducing exposure, keeping data protected in transit, and improving proof of policy enforcement and data movement.
The attacks will come fast and furious. And they aren’t the kind you see in movies with a hacker typing ferociously on a keyboard to somehow hack into a highly efficient system. It’s sadly the exact opposite. It’s a router, sitting in a cabinet, caked in dirt, that has a password like HelloWorld123 set on it in 2006 that someone found and used to get in.
We need to ask our providers, our partners, and our government for the ability to at least audit everything we have and provide assurance over the data, so we can at least shield ourselves from really bad things happening.
Resources