SV // CW-U #02

Ep. 02: Prepositioning
The Threat to Our Telecom Infrastructure

Cyber Warfare: Unattributed
TopicSalt Typhoon / Volt Typhoon / India Telecom / Recent Breaches
Download PDF
// Episode Summary
// 01  —  Salt Typhoon: Inside the Wiretap Infrastructure

Salt Typhoon breached major US broadband providers including Verizon, AT&T, and Lumen Technologies, compromising the systems built specifically for law enforcement wiretapping. The group was not interested in ordinary call records. They were inside the infrastructure that governments use to surveil their own suspects.

Salt Typhoon
Also known as RedMike, Ghost Emperor, Earth Estries, Famous Sparrow, Operator Panda. Attributed to China's Ministry of State Security (MSS).
Attribution
MSS. China's civilian foreign intelligence service. Responsible for external intelligence collection and foreign operations.
Scale
FBI confirmed at least 200 companies compromised across 80+ countries.
What Was Accessed
The CALEA intercept infrastructure. The group accessed the active intercept list, which shows exactly which phone numbers are under ongoing law enforcement surveillance at any given moment.
Data Exfiltrated
Call detail records, SMS metadata, and in some cases live audio intercepts of senior government officials.
Initial Access Vector
Unpatched Cisco network devices. The vulnerabilities were discovered and patched by Cisco in 2023. The telecom companies never applied the patches.
Persistence
The group remained active through early 2026 despite US Treasury sanctions against Sichuan Juxinhe Network Technology Co. Ltd., identified as a front company. In December 2025, Salt Typhoon was found inside a US House of Representatives committee network. In January 2026, the group attempted to compromise an additional 1,000 Cisco devices globally.
CALEA: Why This Matters
// Salt Typhoon: Key Events
2023
Cisco vulnerability discovered and patched. US telecom companies fail to apply the patches.
Late 2024
Salt Typhoon breach of US carriers confirmed. Verizon, AT&T, and Lumen Technologies among those compromised. CALEA wiretap infrastructure accessed.
Dec 2024
FBI public advisory issued. Citizens advised to stop using standard calls and SMS and switch to end-to-end encrypted applications.
Dec 2025
Salt Typhoon found inside a US House of Representatives committee network.
Jan 2026
Group observed attempting to compromise 1,000+ additional Cisco devices globally.
2025–2026
Trend Micro confirms Salt Typhoon activity inside Indian organizations. Target cluster also includes Afghanistan, Taiwan, Philippines, and Brazil. Trend Micro
// 02  —  Volt Typhoon: Prepositioning for Disruption

Volt Typhoon is a different group with a different mission. Where Salt Typhoon is about intelligence collection, Volt Typhoon is about prepositioning. Placing dormant implants inside critical infrastructure that can be activated when needed.

Volt Typhoon
Attributed to the People's Liberation Army (PLA), the Chinese military. A military operation, not a civilian intelligence one.
Mission
Not espionage. Prepositioning for disruption and degradation of services. Known targets include US power grids, water treatment systems, ports, and pipelines.
Dwell Time
Volt Typhoon was found lurking inside US power grid infrastructure for approximately 300 days before detection.
The Geneva Acknowledgement
Per The Wall Street Journal: in a classified meeting in Geneva in December 2024, Chinese officials acknowledged Volt Typhoon's prepositioning to their US counterparts. The reported message: “Yes, that is us. Consider it a signal about Taiwan.” The first known instance of Chinese officials publicly acknowledging one of their own APT groups.
Strategic Context
Gray zone deterrence. China has positioned itself so that in any military escalation over Taiwan, it can degrade US critical infrastructure remotely. Dormant implants in power grids, water systems, and ports function as leverage held in reserve.
// 03  —  India: On the Target List, Off the Record

India is not on the periphery of this campaign. The evidence is documented. The institutional response is silence.

200+ Companies compromised globally FBI confirmed
80+ Countries affected FBI confirmed
263 Avg. days to detect & contain a breach in India IBM Cost of a Data Breach India 2025
0 CERT-In advisories on Salt or Volt Typhoon As of episode recording
India as a Target: The Evidence
India's Telecom Vulnerability Surface
India's Military Communications: A Separate Architecture
The Regulatory Picture
// 04  —  Recent Breach News
Unverified Claim
Ashok Leyland Alleged Breach
Pakistan-Aligned Hacktivist Claim
Evil Markers: Alleged Electoral Data
Extortion
McDonald's India: Everest Group Claim
Major Platform Breach
Vercel: Third-Party AI Tool as the Entry Point
Research
Commercial Surveillance Vendors Abusing Telecom Signaling Protocols
// India Cybercrime Statistics: 2025
₹22,495 Cr Lost to cyber fraud Ministry of Home Affairs, 2025
28.15L Cybercrime cases recorded Ministry of Home Affairs, 2025
+24% Year-on-year case volume increase MHA, 2025
>75% Losses from investment fraud Fake trading platforms, crypto scams, sham IPOs
Chinese Criminal Networks in Indian Banking
// 05  —  End of Transmission
Episode Recap
Next Ep.

The series continues. End of transmission.


// Glossary: Acronyms and Full Forms
// Sources and Further Reading
// Listen and Follow
Website Spotify Apple Podcasts YouTube

Hosted by Krutik

Produced by SpyVeil