Salt Typhoon Expands Beyond the US: Singapore and Norway Telecom Networks Targeted
The Chinese state-sponsored Salt Typhoon threat actor extends its campaign beyond US carriers, hitting four major Singapore telecoms and Norwegian organizations, while the FBI warns the threat remains "very much ongoing."
The Salt Typhoon campaign — a Chinese state-sponsored espionage operation targeting telecommunications infrastructure — has expanded significantly beyond its original US focus. In February 2026, Singapore formally attributed attacks on four of its largest telecom providers to Salt Typhoon, and Norway's Police Security Service confirmed that Norwegian organizations were targeted through vulnerable network devices.
Singapore Attribution
On February 10, 2026, Singapore's government publicly attributed cyberattacks on Singtel, StarHub, M1, and Simba Telecom to the Salt Typhoon threat actor. These four companies constitute the core of Singapore's telecommunications infrastructure, serving the vast majority of the city-state's mobile and fixed-line subscribers. Singapore's decision to publicly name Salt Typhoon — and by extension, attribute the attacks to a Chinese state-sponsored group — is significant. Singapore has historically been cautious about public attribution of state-sponsored cyber activity, particularly when it involves China, its largest trading partner.
Norway Targeted
Norway's Police Security Service (PST) announced on February 6 that Salt Typhoon had targeted Norwegian organizations through exploitation of vulnerable network devices — the same general attack pattern used in the US and Singapore campaigns. The specific Norwegian targets were not publicly named, but the reference to network devices aligns with Salt Typhoon's known tradecraft of exploiting edge networking equipment — routers, firewalls, and VPN appliances — to gain persistent access to carrier networks.
US Congressional Pressure
In the United States, the political dimension of the Salt Typhoon campaign intensified. On February 3, Senator Maria Cantwell accused AT&T and Verizon of blocking the release of security assessment reports produced by Mandiant, the Google-owned incident response firm that investigated the Salt Typhoon intrusions into US telecom networks. Cantwell called for AT&T and Verizon CEOs to testify before Congress about the scope of the compromise and the carriers' remediation efforts.
The FBI stated publicly that the Salt Typhoon threat is "still very, very much ongoing" — a characterization that suggests the threat actor has not been fully ejected from all compromised networks, or that new intrusion attempts continue to be detected.
The Broader Campaign
Salt Typhoon is classified as a Chinese state-sponsored threat actor whose primary mission is intelligence collection through telecommunications infrastructure. By compromising carrier networks, Salt Typhoon can intercept call metadata, text messages, and potentially voice communications for targeted individuals — including government officials, corporate executives, and intelligence targets. The expansion to Singapore and Norway confirms that the campaign is global in scope, not limited to US interests, and is actively targeting the telecommunications backbone of allied nations across multiple continents.
For telecom operators worldwide, the Salt Typhoon campaign has become the defining infrastructure security threat of 2025-2026. The FBI's characterization of the threat as ongoing means that defensive measures must assume continued adversary activity rather than a concluded incident.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.