Salt Typhoon Research

Why Salt Typhoon currently cannot be removed.

Salt Typhoon is still resident in U.S. telecommunications networks as of late 2025. That is not a Trenchwork claim — it is a CISA / FBI statement of public record, made by named officials, on the record, against the carriers’ own contemporaneous claims of removal. This page documents the eight structural reasons removal has not happened and explains what would have to change for it to happen. The reasons are technical, operational, regulatory, and definitional — they compound, and none of them is solvable by a CVE patch.

The factual baseline

Three pieces of public record establish that Salt Typhoon has not been removed.

“I think it would be impossible for us to predict a time frame on when we’ll have full eviction.” — Jeff Greene, Executive Assistant Director for Cybersecurity, CISA, December 3, 2024 press briefing.1
U.S. officials “continue to insist that Salt Typhoon remains active in U.S. networks,” and the carrier statements that they had “purged” or “contained” the breach “contain legalese, measuring one point in time.” — CyberScoop reporting on government counter-assessment vs. AT&T / Verizon / Lumen claims, December 2024.2
The FCC’s post-Salt-Typhoon Communications-Service-Provider Cybersecurity Reporting Requirements — the only enforceable federal rule put in place after the intrusion — were partially rolled back in November 2025. The FCC’s own draft ruling conceded the underlying vulnerabilities “are still being exploited.” — Senate Commerce Committee statement on the FCC rollback; CyberScoop reporting.23
  1. Technical · persistence

    The persistence kit doesn’t depend on the entry vector — patches don’t evict it.

    Cisco Talos’s incident-response writeup4 documents an inventory of persistence techniques the group runs once inside a Cisco IOS XE / IOS / NX-OS device. Each survives patching the CVE that admitted them: once the GRE tunnel and the alternate-port sshd and the modified AAA server and the rotated SNMP community are in place, removing them requires touching the device’s running configuration line by line, not pushing an image update.

    Custom tool

    JumbledPath

    Go ELF binary for x86-64 Linux. Packet capture through a jump-host plus log-impairing on the jump path.

    Tunneling

    GRE / IPsec

    Traffic mirroring at the packet layer. Looks like legitimate routing to the defensive stack.

    Container

    Guest Shell

    IOS XE’s legitimate sysadmin container, repurposed. Standard auditing commands don’t surface processes inside it.

    SSH backdoor

    sshd_operns / 57722

    Alternate SSH daemon on a high port; authorized_keys under root; Linux users via direct edit of /etc/passwd.

    Config drift

    AAA / ACL / SNMP

    TACACS+ server-IP swap, loopback IP changes, ACLs admitting attacker IPs, SNMP community rotation.

    Anti-forensics

    Log clearing

    .bash_history, auth.log, lastlog, wtmp, btmp cleared. The evidence trail goes with them.

    Windows side

    Demodex rootkit

    Kernel-mode rootkit on the Windows side of the campaign (Trend Micro / Kaspersky reporting).

    LOTL

    Living-off-the-land

    Built-in tcpdump, monitor capture, native IOS XE features in attacker-defined ways. No malware artefact on the device beyond JumbledPath.

  2. Technical · firmware

    ROMMONkit-class persistence cannot be defender-validated.

    Per MITRE ATT&CK technique T1542.004 (Pre-OS Boot: ROMMONkit),5 adversaries can overwrite the ROMMON image with malicious code that operates before the operating system loads, providing persistence “in a way that may be difficult to detect.” Cisco’s IOS XE factory-reset all secure command on 17.18.1a or later clears SPI NOR FLASH, config-register, and ROMMON variables6 — but there is no documented means for defenders to independently validate ROMMON cleanliness without vendor support. On older platforms where the secure reset semantics don’t exist, the device requires physical access for console-cable ROMMON reflash, or replacement. The defender cannot prove the bootloader is clean from the network side — only the vendor can.

  3. Technical · credentials

    The credential layer is its own multi-year program — CVE patches don’t rotate stolen secrets.

    Cisco Talos’s account of investigated incidents is explicit: “In all the other incidents we have investigated to date, the initial access to Cisco devices was determined to be gained through the threat actor obtaining legitimate victim login credentials.”4 Anne Neuberger’s December 2024 White House briefing put the credential-surface compromise at roughly 100,000 router admin accounts.7 Patching a CVE does not rotate a stolen credential. Rotating ~100,000 admin credentials at carrier scale, across acquired legacy networks, with TACACS+ / RADIUS shared secrets and BGP/OSPF authentication keys and SSH host keypairs and SNMPv3 user credentials, is its own multi-year operational program. Until it is run end-to-end — including the AAA-server side, including the service accounts used by mgmt tooling — the stolen credentials remain usable. The single-CVE framing of removal misses the entire credential surface.

  4. Operational · synchronization

    Eviction must be simultaneous across the affected estate — partial response alerts the actor.

    The August 2025 CISA / NSA / FBI joint advisory AA25-239A states the operational constraint directly: “Where possible, gaining a full understanding of the APT actors’ extent of access into networks followed by simultaneous measures to remove them may be necessary to achieve a complete and lasting eviction. Partial response actions may alert the actors to an ongoing investigation and jeopardize the ability to conduct full eviction.”8

    For a tier-1 carrier, the affected estate is hundreds to thousands of routers across thousands of POPs distributed across every U.S. state and territory. The cut window has to be coordinated across carrier ops, vendor TAC, federal IR, and (where lawful intercept is in scope) FBI / FCC liaison — over an out-of-band comms plan, because admin email and chat are presumed compromised. No tier-1 carrier maintains the standing field-engineering capacity for a nationwide simultaneous cut window as a baseline. The capacity has to be assembled, which means scheduling, which means coordination, which is exactly the planning surface the joint advisory says must precede the cut.

  5. Protocol · legacy

    The SS7 / Diameter signaling layer can’t be patched out — it’s an architecture problem measured in years.

    SS7 (legacy 2G/3G) and Diameter (4G/5G control plane) are the protocols carriers use for call setup, SMS delivery, subscriber location, and roaming. They lack origin authentication by design; any peer connected to the SS7 international transit network can issue queries that the receiving switch will honor. Salt-Typhoon-class abuse at this layer doesn’t look like “a CVE on a router” — it looks like fraudulent signaling sources inserted at HLR / HSS, MSC, MME, or PGW boundaries. Defenses are architectural: SS7 firewalls (Mavenir, Adaptive Mobile, Cellusys) at the international interconnect, Diameter Edge Agent screening per GSMA FS.11 / FS.19, partner-validation policies at the IPX boundary, and ultimately migration to 5G Standalone’s Service-Based Architecture. Per public reporting, this is “years (and billions of dollars) to replace.”2 Until then, the protocol layer remains a parallel persistence path independent of the IP-layer device fleet.

  6. Forensic · visibility

    The evidence you would need to confirm eviction is the evidence the actor erased.

    The December 2024 CISA / FBI / NSA joint advisory documents that Salt Typhoon erased logs.8 Telecoms weren’t keeping adequate logs to begin with. Network devices rarely run EDR; firmware implants live below the layer most security tooling can see. You cannot evict what you cannot detect, and you cannot detect what your tools can’t reach. “We don’t see Salt Typhoon on our network” is consistent with both successful eviction and continued residence with successful evasion — the persistence kit explicitly includes Guest Shell processes that don’t surface in standard auditing commands.4 A claim of removal grounded in absence of alerts is not the same as a claim grounded in positive evidence.

  7. Definitional · vocabulary

    There is no shared definition of “evicted” — carriers and the government use the same word to mean incompatible things.

    In December 2024, AT&T, Verizon, and Lumen publicly stated they had “purged” or “contained” the breach.2 In the same week, CISA and the FBI publicly said Salt Typhoon was still active in U.S. telecom networks.1 Both sides were speaking truthfully because “purged” / “contained” / “evicted” are not defined terms with auditable criteria attached. When the Senate Commerce Committee demanded documentation supporting the carrier claims, AT&T and Verizon failed to provide any.3 A removal claim that depends on the carrier’s self-vocabulary is structurally unverifiable; the absence of agreed criteria is a precondition for the December-2024 dispute to keep replaying. See the Closure page for the six-criterion definition Trenchwork proposes.

  8. Regulatory · enforcement

    The FCC rolled back its only enforceable post-Salt-Typhoon rule in November 2025.

    After Salt Typhoon, the FCC adopted Communications-Service-Provider Cybersecurity Reporting Requirements — the lone enforceable federal rule with teeth. In November 2025 the FCC partially rolled those rules back, under FCC Chair Brendan Carr; the FCC’s own draft ruling conceded that the underlying vulnerabilities “are still being exploited.”23 Without an enforceable reporting baseline, every device-level and architectural control a carrier might deploy remains best-effort rather than auditable. Removal is not just a technical problem — it is a regulatory problem whose enforcement layer is currently going in the wrong direction.

  9. Escalation · scope

    The National Guard breach demonstrates that the target set is expanding, not stabilizing.

    Per a Department of Homeland Security memo dated June 11, 2025 — obtained by FOIA, first reported by NBC News — Salt Typhoon “extensively compromised a U.S. state’s Army National Guard network” from March through December 2024.9

    DHS memo · June 2025

    Exfiltrated during the nine-month intrusion:

    • Administrator credentials for the Guard network.
    • Network diagrams and a geographic location map of state Guard installations.
    • PII of service members.
    • Network configuration files and data traffic with the unit’s counterparts in every other U.S. state and at least four U.S. territories.
    • 1,462 network-configuration files from ~70 U.S. government and critical-infrastructure entities across 12 sectors during 2023–2024.

    The exfiltrated data is itself a follow-on weapon. Admin credentials and network diagrams pre-position the actor for the next intrusion. In fourteen states, Army National Guard units are integrated with state fusion centers responsible for cyber threat-sharing — the loot from one unit maps directly onto the cybersecurity partners of every other unit. Removal is harder this year than last because the surface to be cleaned is larger this year than last.

What removal would actually require

The eight reasons above compound. None is solvable by a single tool, a single agency, or a single vendor. What removal would require is the union of four currently-missing pieces:

(1) Continuous variant pre-emption on the inflow side — so each new vendor advisory triggers the variant-research workflow before the adversary weaponises the next CVE. This is the Fulcrum and Bulwark proposal: per-engagement and continuous variant research with the disclosure terminal pinned to PSIRT / HackerOne / CERT/CC.

(2) A simultaneous-eviction planner — so the cut window CISA AA25-239A requires can actually be staffed at tier-1 scale, with the trust-graph, dependency-ordered touch list, personnel allocation, and OOB comms plan produced as a planning artifact carriers, vendor TAC, and federal IR can coordinate against. This is the Closure proposal’s Phase 1.

(3) A shared definition of “evicted” with auditable criteria — so the December-2024 dispute stops replaying. Six criteria (C1–C6), required and conditional signers, and the closure artifact specification are on the Closure page. Carriers, CISA, vendor TAC, and federal IR sign against the same evidence; absent that, every public “purged” statement remains structurally unverifiable.

(4) The federal authority to broker the carrier-side operation — because no research vendor, including Trenchwork, can dispatch field engineers to thousands of POPs or compel carrier participation in a simultaneous cut. The milestone-based reward structure in the open letter is calibrated against exactly this gap. The carrier-side operation Closure is designed to plan-and-validate lives on the eviction runbook; the scope honesty about what Trenchwork can and cannot deliver lives on the eviction-scope page.

How to read the claims on this page

Same taxonomy as the rest of the site.

Documented
The CISA / FBI / NSA joint advisories, the FCC docket on the rollback, the MITRE T1542.004 technique reference, vendor documentation (Cisco factory-reset, IOS XE hardening). Treat as facts.
Reported
The Jeff Greene briefing quote, the carriers’ “purged/contained” statements, Talos’s incident-response account, the Neuberger ~100,000-credential figure, the DHS memo as obtained via FOIA. Treat as facts conditional on the briefer’s reliability.
Argued
The structural framing — that these eight reasons compound, that removal requires the union of four currently-missing pieces — is Trenchwork’s position. These are arguments, not facts. Disagreement is invited.
Reference gaps
The specific U.S. state hosting the compromised Army National Guard network, the specific initial-access vector for that intrusion, and the per-victim dwell-time figures across the affected telecoms are not in the public record at time of writing. Corrections invited via the errata channel on the home page.
Scope of claim
If a tier-1 U.S. carrier signs a Milestone-3-shaped closure artifact in the future, this page’s thesis needs an update. As of this writing no such artifact exists in the public record.

References

  1. CyberScoop. U.S. government says Salt Typhoon is still in telecom networks. December 3, 2024. cyberscoop.com/u-s-government-says-salt-typhoon-is-still-in-telecom-networks. Source for the Jeff Greene “impossible to predict a time frame” quote and the “each victim is unique” framing.
  2. CyberScoop. A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon. cyberscoop.com/salt-typhoon-chinese-hackers-us-telecom-breach. Source for the AT&T / Verizon / Lumen “purged/contained” statements, the official counter-assessment, the SS7/Diameter “years and billions” framing, and the FCC-rollback reporting.
  3. U.S. Senate Committee on Commerce, Science, and Transportation. Cantwell statement on the FCC’s rollback of post-Salt-Typhoon network-protection rules (November 2025) and the AT&T / Verizon documentation gaps. commerce.senate.gov — Cantwell on FCC rollback.
  4. Cisco Talos. Weathering the storm: In the midst of a Typhoon. February 2025. blog.talosintelligence.com/salt-typhoon-analysis/. Primary source for the credential-first finding, JumbledPath, GRE-tunnel persistence, Guest Shell abuse, sshd_operns on 57722, and the running-config / log-clearing inventory.
  5. MITRE ATT&CK. Pre-OS Boot: ROMMONkit, Sub-technique T1542.004. attack.mitre.org/techniques/T1542/004/. Source for “may be difficult to detect” characterisation and the defender-side validation gap.
  6. Cisco. IOS XE 17 Software Configuration Guide — Factory Reset and BIOS Protection. cisco.com — ASR 1000 factory-reset configuration guide and cisco.com — Catalyst 9500 BIOS Protection.
  7. Anne Neuberger, Deputy National Security Advisor for Cyber and Emerging Technology. White House press briefing remarks on Salt Typhoon scope — nine confirmed U.S. telecommunications-carrier compromises and the ~100,000-router admin credential figure. December 2024. Verify against the official briefing transcript at whitehouse.gov.
  8. CISA, NSA, FBI, and international partners. Joint Cybersecurity Advisory AA25-239A: Chinese state-sponsored cyber actors targeting networks globally (August 27, 2025) and the prior December 2024 Enhanced Visibility and Hardening Guidance advisory. cisa.gov/news-events/cybersecurity-advisories/aa25-239a. Source for the simultaneous-eviction discipline and the “partial response alerts the actor” constraint.
  9. Department of Homeland Security · Office of Intelligence and Analysis. Salt Typhoon: Data Theft Likely Signals Expanded Targeting. Memo dated June 11, 2025. Obtained via FOIA by Property of the People; first reported by NBC News, July 16, 2025. nbcnews.com — National Guard hacked by Chinese ‘Salt Typhoon’ campaign; memo PDF at documentcloud.org/documents/25998809.