Salt Typhoon: A Wake-Up Call for North American Mobile Operators and the need for Continuous Security Testing

In late 2024, the telecommunications industry was rocked by one of the most sophisticated cyber espionage campaigns in recent memory. The Salt Typhoon attack infiltrated at least eight major U.S. telecom providers, including AT&T, Verizon, Lumen, and others.
The attacks compromise devices like routers, switches and firewalls, gaining undetected access to sensitive communications, including those of government officials.
The Impact on Mobile Operators
While some operators like T-Mobile reported successfully thwarting the intrusion, others were not as fortunate. The breach exposed systemic weaknesses in telecom infrastructure, including:
- Legacy systems with unpatched vulnerabilities were prime targets.
- Lawful intercept backdoors, originally designed for legal surveillance, were repurposed by attackers.
- Edge devices lacked sufficient observability and were exploited to exfiltrate data silently over months
The implications were severe—not just for the telecom sector, but for national security, public trust, and the broader digital economy. The Federal Communications Commission (FCC) responded swiftly, proposing new compliance frameworks requiring annual cybersecurity certifications and risk management plans from telecom providers
Why Continuous Testing Is No Longer Optional
Salt Typhoon didn’t just exploit technical flaws—it exposed a cultural one: a reactive, compliance-driven approach to cybersecurity. Many operators had focused on meeting regulatory checkboxes rather than proactively hunting for threats.
In contrast, continuous security testing ensures that operators can stay ahead of constantly evolving cyber threats through:
- Attack & Performance Test
Validating infrastructure equipment ensures that they withstand the latest industry CVEs while maintaining the expected end-user performance - AI-Driven Threat Detection
Static defenses are insufficient. AI and machine learning apps can hunt for intrusions and detect anomalies in real time, reducing the time malware has in the system from months to minutes. - Supply Chain Audits
Many breaches originate from third-party vendors. Continuous vetting and firmware integrity checks are essential. - Simulated Crisis Drills
Just as fire drills prepare buildings for emergencies, cyberattack simulations prepare teams to respond swiftly and effectively.
How VIAVI Can Help
The Salt Typhoon campaign is a defining moment for the telecom industry. It underscores that cybersecurity is a journey, not a destination. Continuous testing, proactive defense, and cross-industry collaboration must become the new standard.
VIAVI TeraVM Security Test provides firewall test with real traffic and malware to stress the system under test and validate their defense against the latest industry threats, including Salt Typhoon CVEs, and to measure the performance of the firewall while eliminating threats.
Used by the leading firewall vendors, TeraVM can also simulate attacks to help operators check the integrity of the infrastructure and prepare mitigation.
As the FCC and CISA roll out new guidelines, mobile operators have a unique opportunity to lead by example. By embracing a culture of continuous improvement and resilience, they not only protect their networks, but also restore public trust in the digital infrastructure that underpins modern life.