Salt Typhoon and UNC4841 domains reveal longstanding cyber espionage infrastructure
Summary
Hide ▲
Show ▼
A set of 45 previously unreported domains, some dating back to May 2020, have been linked to China-linked threat actors Salt Typhoon and UNC4841. These domains indicate a longstanding cyber espionage campaign targeting telecommunications and other sectors. The domains were used to facilitate various malicious activities, including zero-day exploitation and phishing. The infrastructure overlaps with known TTPs of other China-associated groups, suggesting coordinated efforts. The oldest domain, onlineeylity[.]com, was registered in May 2020 using a fake persona. Organizations are advised to review DNS logs for potential compromises.
Timeline
-
09.09.2025 03:27 1 articles · 23d ago
45 previously unreported domains linked to Salt Typhoon and UNC4841 cyber espionage
A set of 45 previously unreported domains, dating back to May 2020, have been identified as part of a longstanding cyber espionage campaign by Salt Typhoon and UNC4841. These domains indicate earlier activity than previously known, with the oldest domain, onlineeylity[.]com, registered on May 19, 2020. The infrastructure overlaps with known TTPs of other China-associated groups, suggesting coordinated efforts. Organizations are advised to review DNS logs for potential compromises.
Show sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
Information Snippets
-
45 previously unreported domains have been identified as part of a longstanding cyber espionage campaign by Salt Typhoon and UNC4841.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
The domains date back to May 2020, indicating earlier activity than previously known.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
Salt Typhoon is believed to be operated by China's Ministry of State Security (MSS).
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
The domains were registered using fake personas and Proton Mail email addresses.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
The oldest domain, onlineeylity[.]com, was registered on May 19, 2020.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
The infrastructure overlaps with known TTPs of other China-associated groups, including UNC4841.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
UNC4841 is known for its zero-day exploitation of Barracuda Email Security Gateway (ESG) appliances (CVE-2023-2868).
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
Many of the domains pointed to high-density IP addresses, indicating shared infrastructure.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
-
Organizations are advised to review DNS logs for potential compromises related to these domains.
First reported: 09.09.2025 03:271 source, 1 articleShow sources
- 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage — thehackernews.com — 09.09.2025 03:27
Similar Happenings
PyPI implements expired domain checks to prevent account takeovers and supply chain attacks
The Python Package Index (PyPI) has implemented a new security measure to check for expired domains, blocking over 1,800 email addresses tied to expired domains since June 2025. This update targets domain resurrection attacks, where malicious actors exploit expired domains to gain unauthorized access to PyPI accounts. PyPI uses Domainr's Status API to determine a domain's lifecycle stage and mark email addresses as unverified, preventing password resets and other account recovery actions. Users are advised to enable two-factor authentication (2FA) and add a secondary verified email address from a notable domain to enhance security. Additionally, PyPI has warned of a new wave of phishing attacks using fake websites to steal user credentials, advising users to change passwords and use phishing-resistant 2FA methods.