28 August, 2025
CHINA-TECHNOLOGY-HACKING

This photo taken on August 4, 2020 shows Prince, a member of the hacking group Red Hacker Alliance who refused to give his real name, using a website that monitors global cyberattacks on his computer at their office in Dongguan, China's southern Guangdong province. - From a small, dingy office tucked away in an industrial city in southern China, one of China's last "volunteer hacker" groups maintains a final outpost in its patriotic hacking war. (Photo by NICOLAS ASFOURI / AFP) / TO GO WITH China-hacking-security,FOCUS by Laurie Chen / The erroneous mention[s] appearing in the metadata of this photo by NICOLAS ASFOURI has been modified in AFP systems in the following, we removed the HOLD HOLD HOLD in the main caption. Please immediately remove the erroneous mention[s] from all your online services and delete it (them) from your servers. If you have been authorized by AFP to distribute it (them) to third parties, please ensure that the same actions are carried out by them. Failure to promptly comply with these instructions will entail liability on your part for any continued or post notification usage. Therefore we thank you very much for all your attention and prompt action. We are sorry for the inconvenience this notification may cause and remain at your disposal for any further information you may require. (Photo by NICOLAS ASFOURI/AFP via Getty Images)

On August 27, 2023, a coalition of twenty-three cyber, defense, and intelligence agencies from the United States and allied nations issued a significant advisory. This document outlined the tactics and techniques employed by state-sponsored hackers from China, specifically the group known as Salt Typhoon. The advisory provides crucial insights into how these hackers infiltrated major telecommunications networks in the U.S. last year, prompting authorities to encourage organizations to proactively search for signs of this malicious activity.

The joint advisory highlighted a broader concern regarding the capabilities of these cyber threat actors, who have reportedly compromised networks across the globe. This activity is believed to support a sophisticated espionage apparatus backed by the Chinese government. Officials underscored the urgency of the situation, emphasizing the need for vigilance in cybersecurity practices.

Identification of Linked Companies

In their advisory, authorities identified three Chinese companies associated with the Salt Typhoon campaign. One of these firms is the U.S.-sanctioned Sichuan Juxinhe Network Technology Co., Ltd.. The other two companies, which had not been publicly linked to the campaign before, are Beijing Huanyu Tianqiong Information Technology Co., Ltd. and Sichuan Zhixin Ruijie Network Technology Co., Ltd.. This revelation expands the understanding of the network supporting these cyber operations.

The advisory serves not only as a warning but also as a call to action for organizations to enhance their cybersecurity measures. Industry experts stress the importance of understanding the tactics used by these hackers to mitigate potential risks effectively. By identifying the companies involved, authorities aim to disrupt the operations of the Salt Typhoon group and limit its ability to conduct further attacks.

Global Implications of the Advisory

The implications of this advisory extend beyond the immediate cybersecurity landscape. It highlights the ongoing geopolitical tensions between China and the United States, particularly in the realm of technology and information security. The identification of these companies could lead to further scrutiny and potential sanctions, impacting their operations both domestically and internationally.

As cyber threats continue to evolve, the collaboration among nations to combat these challenges is crucial. The advisory demonstrates a unified stance against state-sponsored cyber activities, reinforcing the need for international cooperation in addressing such threats. As organizations digest this information, they are reminded of the critical role they play in safeguarding their networks against sophisticated cyber intrusions.

In light of these developments, organizations are urged to review their cybersecurity protocols and remain vigilant against potential threats. The Salt Typhoon campaign serves as a stark reminder of the persistent risks posed by state-sponsored hacking groups and the importance of collective action in the face of such challenges.