Salt Typhoon Breach: A Year-Long Cyber Comedy of Errors for US National Guard
Salt Typhoon’s cyber espionage campaign has struck again, this time breaching the National Guard. This advanced persistent threat, linked to China, had free reign for nearly a year, like an uninvited guest who overstays their welcome and leaves with your Wi-Fi password. National security never looked so awkward.

Hot Take:
Salt Typhoon continues to hang around like that one relative who overstays their welcome during the holidays. Not only did they manage to couch-surf through the National Guard’s network for nearly a year, but they might have also left behind a few “souvenirs” in the form of backdoors. It’s like they came for the Christmas cookies and left with the entire tin, plus the recipe!
Key Points:
- Salt Typhoon, linked to China, breached the US National Guard for months, collecting sensitive data.
- The cyber-espionage group targeted the National Guard between March and December last year.
- The breach involved access to network diagrams, administrator credentials, and personal information.
- The attack could hinder state-level cybersecurity efforts and impact US critical infrastructure.
- Recommendations focus on securing SMB traffic and preventing credential harvesting.
Already a member? Log in here