Article Details
Scrape Timestamp (UTC): 2025-06-19 12:00:12.595
Original Article Text
Click to Toggle View
Telecom giant Viasat breached by China's Salt Typhoon hackers. Satellite communications company Viasat is the latest victim of China's Salt Typhoon cyber-espionage group, which has previously hacked into the networks of multiple other telecom providers in the United States and worldwide. Viasat provides satellite broadband services to governments worldwide and aviation, military, energy, maritime, and enterprise customers. Last month, the telecom giant told shareholders that it had approximately 189,000 broadband subscribers in the United States. The company discovered the Salt Typhoon breach earlier this year and has been working with federal authorities to investigate the attack, as Bloomberg first reported. "Viasat and its independent third-party cybersecurity partner investigated a report of unauthorized access through a compromised device. Upon completing a thorough investigation, no evidence was found to suggest any impact to customers," Viasat told BleepingComputer. "Viasat engaged with government partners as part of its investigation. Due to the sensitive nature of information sharing with government partners, we are unable to provide further details. Viasat believes that the incident has been remediated and has not detected any recent activity related to this event." Russian hackers also breached Viasat's KA-SAT consumer-oriented satellite broadband service in February 2022, wiping satellite modems using AcidRain data wiper malware roughly one hour before Russia invaded Ukraine. The 2022 cyberattack impacted tens of thousands of broadband customers in Ukraine and Europe, including modems controlling roughly 5,800 wind turbines in Germany. Salt Typhoon telecom breaches As the FBI and CISA confirmed in October, the Chinese Salt Typhoon state hackers had breached multiple telecom providers (including AT&T, Verizon, Lumen, Charter Communications, Consolidated Communications, and Windstream) and other telecom companies in dozens of countries. While inside U.S. telecom networks, the attackers also accessed the U.S. law enforcement's wiretapping platform and gained access to the "private communications" of a "limited number" of U.S. government officials. Earlier this month, NSA and CISA officials also tagged Comcast and Digital Realty as potentially compromised in Salt Typhoon's telecom attacks. Salt Typhoon has been breaching government organizations and telecom companies since at least 2019 and kept actively targeting telecoms between December 2024 and January 2025, breaching more telecommunications providers worldwide via unpatched Cisco IOS XE network devices. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.
Daily Brief Summary
China's cyber-espionage group, Salt Typhoon, successfully infiltrated Viasat, a major provider of satellite broadband globally, serving government, military, and other sectors.
The breach was detected earlier this year and investigations have been conducted by Viasat with the help of federal authorities and a private cybersecurity firm, concluding no customer data was compromised.
Past attacks by Salt Typhoon include multiple U.S.-based telecom providers such as AT&T, Verizon, and others, along with gaining unauthorized access to U.S. law enforcement's wiretapping systems and private communications of some U.S. officials.
Salt Typhoon has been actively targeting telecom companies since at least 2019 and continued their cyberattacks as recently as January 2025 through exploiting unpatched network devices.
Viasat had a previous cybersecurity issue in February 2022 when Russian hackers disrupted satellite services in Ukraine and Europe by deploying AcidRain malware.
The firm confirmed the incident has been fully remediated and no subsequent activities related to this breach have been observed.