Salt Typhoon: The Chinese APT That Wiretapped America's Wiretap Infrastructure | Lorikeet Security Skip to main content
Back to Blog

Salt Typhoon: The Chinese APT That Wiretapped America's Wiretap Infrastructure

Lorikeet Security Team February 28, 2026 11 min read

TL;DR: Salt Typhoon, a Chinese state-sponsored APT group, compromised 9+ major US telecoms — including AT&T, Verizon, and T-Mobile — and gained persistent access to CALEA lawful intercept systems. They accessed call metadata for millions of Americans and the actual call content of targeted senior government officials. This is not just an intelligence failure — it is a case study in why every enterprise must treat its network infrastructure as an active adversary target.

What Is CALEA and Why It Was the Target

CALEA — the Communications Assistance for Law Enforcement Act — was enacted in 1994 to ensure that as telecommunications technology evolved, US law enforcement would retain the ability to conduct court-authorized wiretaps. The law requires telecom carriers and broadband providers to build specific intercept capabilities into their infrastructure: essentially, a legally mandated backdoor accessible by the FBI and Department of Justice with appropriate judicial authorization.

From a nation-state intelligence perspective, CALEA infrastructure is one of the most valuable targets imaginable. It is a centralized, standardized interface designed to deliver call content and metadata in clean, structured formats — built specifically to be machine-readable by law enforcement systems. An adversary who gains access to CALEA infrastructure does not need to intercept traffic at individual nodes or perform complex traffic analysis. The hard work has already been done by the carriers themselves, as a legal requirement.

Salt Typhoon understood this. By targeting CALEA systems, Chinese intelligence gained access to a ready-built surveillance platform that US carriers maintain at their own expense and are legally prohibited from removing.


Attack Timeline and Scope

Timeframe Activity Significance
Early 2024 Initial intrusions via unpatched edge routers and credential theft at multiple carriers Established persistent footholds across telecom backbone infrastructure
Mid 2024 Lateral movement to CALEA lawful intercept systems within carrier networks Access to surveillance platform for millions of US communications
Late 2024 Targeted access to call content for specific high-value individuals — government officials, political figures Strategic intelligence collection on US government communications
October 2024 FBI and CISA publicly confirm the breach; at least 9 carriers confirmed affected Public attribution to Salt Typhoon / People's Republic of China
Late 2024 – 2025 Remediation efforts; CISA advisory recommending encrypted communications for sensitive discussions US government acknowledges standard telecom cannot be trusted for sensitive comms

The breadth of the intrusion was extraordinary. Nine confirmed carriers means Salt Typhoon had visibility into a substantial proportion of US telecommunications traffic. The affected carriers include AT&T, Verizon, and T-Mobile — together representing the majority of US mobile subscribers.


How the Attack Was Executed

Salt Typhoon's initial access method was not glamorous: unpatched network edge devices. Enterprise routers and switches from major vendors running outdated firmware with known vulnerabilities provided the initial foothold in multiple cases. Once inside a carrier's network, the group demonstrated sophisticated tradecraft in several areas:

The CISA advisory issued in December 2024 made an extraordinary recommendation: government officials and anyone handling sensitive communications should use end-to-end encrypted messaging applications — Signal, FaceTime — for sensitive conversations, because standard US telecom infrastructure could not be assumed secure. This is the US government's own communications infrastructure advisory.


What Was Accessed

The breach gave Salt Typhoon two distinct intelligence products. The first was bulk call metadata — call detail records showing who called whom, when, for how long, and from what location — for a large population of US telephone subscribers. While not call content, metadata at this scale enables sophisticated social network analysis, identification of intelligence sources and methods, and mapping of sensitive relationships.

The second intelligence product was far more sensitive: actual call content for a targeted set of high-value individuals. This included senior government officials, political campaign staff, and individuals believed to be intelligence community contacts. The content collection was not mass surveillance — it was targeted wiretapping using the same infrastructure that US law enforcement uses for the same purpose.


Enterprise Security Implications

Salt Typhoon is a nation-state operation targeting critical national infrastructure, which places it outside the direct threat model of most enterprises. But the attack techniques and lessons apply directly to corporate network security programs — and the supply chain implications affect every organization that relies on US telecommunications infrastructure.

Network Device Patch Cadence

The initial access vector — unpatched edge routers — is a vulnerability found in the vast majority of enterprise networks. Network hardware patching is chronically underprioritized because it requires maintenance windows, carries change risk, and is managed by network teams rather than security teams. Salt Typhoon's campaign is a direct argument for treating firmware updates on routers, switches, and firewalls with the same urgency as OS patches on servers.

Segmenting the Network Management Plane

Network management infrastructure — management interfaces, SNMP communities, SSH access to network devices — should be treated as its own high-security zone, not as an afterthought. Zero-trust principles applied to the management plane mean no implicit trust from the data plane, dedicated management network segments, strong authentication for all device management access, and logging of all management plane activity to a SIEM.

Lateral Movement Detection on Network Devices

Most enterprise EDR and XDR deployments focus on endpoints and servers. Network devices — routers, switches, wireless controllers — are typically invisible to these tools. Salt Typhoon's lateral movement through carrier network gear went undetected for months. Enterprises should ensure that syslog and SNMP data from all network devices flows to their SIEM, and that detection rules exist for anomalous management plane access patterns.

Metadata Sensitivity

For enterprises handling sensitive communications — M&A discussions, board communications, executive travel schedules — the Salt Typhoon incident is a reminder that call metadata is sensitive intelligence even when call content is not captured. Organizations with elevated threat models should consider encrypted communication platforms for sensitive business discussions.

If you want to understand how your network perimeter and management plane would hold up against an advanced persistent threat, Lorikeet Security's network penetration testing services evaluate exactly these controls — including network device hardening, management plane segmentation, and lateral movement paths through your internal network infrastructure.


Key Takeaways

Test Your Network's Defenses Against Advanced Threats

Lorikeet Security's network penetration testing evaluates your infrastructure against the techniques used by sophisticated adversaries — including network device exploitation, management plane lateral movement, and credential harvesting on internal networks.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!