Chinese state-sponsored APT actors have targeted telecommunications, government, transportation, lodging, and military networks worldwide by exploiting publicly known CVEs, compromising edge routers and using compromised devices and trusted provider links to pivot, persist, and exfiltrate data. Reported activity includes use of custom Go-based SFTP clients, on-box PCAP collection, Guest Shell/container abuse, and tunneling (GRE/IPsec) to move and exfiltrate captured traffic. #SaltTyphoon #CVE-2023-20198
Keypoints
- PRC state-sponsored APT actors have targeted large backbone, PE, and CE routers and leveraged compromised devices and provider-to-provider or provider-to-customer links to pivot across networks.
- Actors frequently exploit known CVEs (e.g., CVE-2024-21887, CVE-2024-3400, CVE-2023-20273, CVE-2023-20198, CVE-2018-0171) for initial access rather than observed zero-days.
- Persistence techniques include modifying ACLs, enabling services (SSH/HTTP/HTTPS) on non-standard ports, adding SSH keys, creating local accounts, and deploying Guest Shell containers to stage tools and data.
- Collection methods emphasize native PCAP/Embedded Packet Capture, TACACS+/RADIUS interception, SNMP enumeration/SET, and configuration/credential harvesting (including weak Cisco Type 5/7 secrets).
- Exfiltration and C2 commonly use VPS infrastructure, multi-hop proxies (e.g., STOWAWAY), GRE/IPsec tunnels, and custom SFTP clients (cmd1, cmd3, new2, sft) to move encrypted archives to staging hosts.
- Detection and hunt recommendations include auditing router configs, monitoring for PCAP/monitor capture commands, tracking non-standard management ports (e.g., 22Ă22, 18xxx, TCP/57722), and validating firmware/image integrity.
- Mitigations prioritize timely patching of known exploited CVEs, management-plane isolation (management VRF/CoPP), enforcing SNMPv3 and strong crypto, disabling unused services (Guest Shell, Smart Install), and centralized immutable logging.
MITRE Techniques
- [T1190 ] Exploit Public-Facing Application â Exploited publicly known CVEs to gain access (âExploit publicly known CVEsâ).
- [T1199 ] Trusted Relationship â Leverage trusted connections between providers to pivot between networks (âLeverage trusted connections between providers to pivot between networksâ).
- [T1583.003 ] Acquire Infrastructure: Virtual Private Servers â Use VPS as infrastructure for C2 and staging (âLeverage VPS as infrastructureâ).
- [T1584.008 ] Compromise Infrastructure: Network Devices â Compromise intermediate routers to support operations (âCompromise intermediate routersâ).
- [T1569 ] System Services â Execute commands via SNMP on network devices (âExecuting commands via SNMPâ).
- [T1609 ] Container Administration Command â Use Guest Shell to load tools and as a jump point (âUse Guest Shell to load open-source tools and as a jump point for reconnaissance and follow-on actions in the environmentâ).
- [T1059.006 ] Command and Scripting Interpreter: Python â Use Python scripts such as siet.py (âUse Python script siet.pyâ).
- [T1059.008 ] Command and Scripting Interpreter: Network Device CLI â Use built-in CLI on network devices to execute native commands (âUse built-in CLI on network devices to execute native commandsâ).
- [T1136.001 ] Create Account: Local Account â Create new local users on network devices for persistence (âCreate new local users on network devices for persistenceâ).
- [T1543.005 ] Container Service â Leverage Guest Shell Linux containers on Cisco OS (âLeverage Linux-based Guest Shell containers, natively supported in a variety of Cisco OS softwareâ).
- [T1098.004 ] Account Manipulation: SSH Authorized Keys â Add keys to SSH services to regain entry (âRegain entry into environments via SSH into network devicesâ).
- [T1068 ] Exploitation for Privilege Escalation â Exploit CVE-2023-20273 for root privileges (âExploit CVE-2023-20273 to gain root-level user privilegesâ).
- [T1110.002 ] Brute Force: Password Cracking â Brute force weak hashed Cisco passwords and reuse credentials (âBrute force passwords with weak encryption in obtained configuration filesâ).
- [T1027.010 ] Obfuscated Files or Information: Command Obfuscation â Obfuscate paths with double-encoding to bypass detection (âObfuscate paths with âdouble encodingââ).
- [T1027 ] Obfuscated Files or Information â Obfuscate source IP addresses in logs so activity appears local (âObfuscate source IP addresses in system logs, as actions may be recorded as originating from local IP addressesâ).
- [T1562.004 ] Impair Defenses: Disable or Modify System Firewall â Modify ACLs to add IPs and bypass policies (âModify ACLs, adding IP addresses to bypass security policies and permit traffic from a threat actor-controlled IP addressâ).
- [T1610 ] Deploy Container â Deploy Guest Shell container on network infrastructure to persist and evade monitoring (âDeploy virtual container (e.g., Guest Shell) on network infrastructure to persist and evade monitoring servicesâ).
- [T1070 ] Indicator Removal â Delete or clear logs to avoid detection (âDelete and/or clear logsâ).
- [T1070.009 ] Indicator Removal: Clear Persistence â Use guestshell destroy to remove container and traces (âUse Guest Shell destroy command to deactivate and uninstall Guest Shell container and return all resources to the systemâ).
- [T1599 ] Network Boundary Bridging â Abuse peering connections for exfiltration and bridging networks (âAbuse peering connectionsâ).
- [T1040 ] Network Sniffing â Passively collect PCAP from networks, especially TACACS+ and RADIUS traffic (âPassively collect packet capture (PCAP) from networks for configurations and credentialsâ).
- [T1556 ] Modify Authentication Process â Change TACACS+ server config to actor-controlled IPs to capture credentials (âModify a routerâs TACACS+ server configuration to point to an APT actor-controlled IP address to capture authentication attemptsâ).
- [T1003 ] OS Credential Dumping â Collect router configurations containing weak Cisco Type 7 passwords (âCollect router configuration with weak Cisco Type 7 passwordsâ).
- [T1082 ] System Information Discovery â Use network device CLI to gather system information (âLeverage CLI on network devices to gather system informationâ).
- [T1016 ] System Network Configuration Discovery â Enumerate interfaces, VRFs, routing, and ACLs via CLI/SNMP (âEnumerate interfaces/VRFs/routing/ACLs and related network settings from the device CLI/SNMPâ).
- [T1021 ] Remote Services â Use SNMP to enumerate and alter other devices in the same community group (âEnumerate and alter the SNMP configurations for other devices in the same community groupâ).
- [T1021.004 ] Remote Services: SSH â Enable SSH and open external-facing ports on network devices (âEnable SSH servers and open external-facing ports on network devices to maintain encrypted remote accessâ).
- [T1560 ] Archive Collected Data â Compile captured configurations and PCAPs for staging and exfiltration (âCompile configurations and packet capturesâ).
- [T1602.001 ] Data from Configuration Repository: SNMP (MIB Dump) â Target MIBs to collect network information via SNMP (âTarget MIB to collect network information via SNMPâ).
- [T1602.002 ] Data from Configuration Repository: Network Device Configuration Dump â Acquire credentials by collecting device configuration dumps (âAcquire credentials by collecting network device configurationsâ).
- [T1005 ] Data from Local System â Collect PCAP from ISP customer networks on the device (âPassively collect PCAP from specific ISP customer networksâ).
- [T1090 ] Proxy â Use VPS/proxy infrastructure for C2 (âUse VPS for C2â).
- [T1090.003 ] Proxy: Multi-hop Proxy â Use tools like STOWAWAY to build chained relays for C2 and operator access (âLeverage open source multi-hop pivoting tools, such as STOWAWAY, to build chained relays for command and control and operator accessâ).
- [T1071 ] Application Layer Protocol â Open various application-layer services (SSH/SFTP/FTP/HTTP/HTTPS) to communicate and exfiltrate (âOpen and expose a variety of different services (e.g., SSH, SFTP, FTP, HTTP, HTTPS)â).
- [T1571 ] Non-Standard Port â Use non-standard/high ports to evade detection (âUtilize non-standard ports to evade detection by security monitoring tools that focus on standard port activityâ).
- [T1572 ] Protocol Tunneling â Create GRE/mGRE/IPsec tunnels on devices for covert channels (âCreate tunnels over protocols such as GRE, mGRE, or IPsec on network devicesâ).
- [T1095 ] Non-Application Layer Protocol â Use GRE/IPsec for C2 over non-application layer protocols (âUse GRE/IPsec to carry C2 over non-application layer protocolsâ).
- [T1048.003 ] Exfiltration over Alternative Protocol â Use tunnels (IPsec/GRE) to exfiltrate data (âUse tunnels, such as IPsec and GRE, to conduct C2 and exfiltration activitiesâ).
Indicators of Compromise
- [IP Addresses ] APT-associated infrastructure from Aug 2021âJun 2025 â examples: 1.222.84[.]29, 167.88.173[.]252 (and many others listed in advisory)
- [File Hashes ] Custom SFTP client binaries â cmd1 MD5 33e692f435d6cf3c637ba54836c63373, cmd3 MD5 eba9ae70d1b22de67b0eba160a6762d8; and SHA-256 hashes: cmd1 f2bbba1eâŚ, cmd3 8b448f47⌠(and other clients new2, sft)
- [File Names ] On-box capture and staging filenames â mycap (capture name), tac.pcap (exported PCAP filename), 1.pcap
- [Network/Port Indicators ] Management and actor-favored ports and services â SSH on high non-default ports (22Ă22/xxx22), HTTPS on high ports (18xxx), TCP/57722 sshd_operns on IOS XR, TACACS+ on TCP/49
- [Yara/IDS Rules ] Detection signatures â Cmd1 Yara rule strings (e.g., âmonitor capture CAPâ, âmain.CapExportâ) and Snort rule for CVE-2023-20198 HTTP POST to webui_wsma endpoints
Read more: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a