Industries

Telecommunications

Salt Typhoon had persistent access inside 9 major U.S. telecom carriers for 2+ years. Telecom networks carry the communications of every other sector — making their compromise a national security event. Aktoh deploys autonomous AI defense for telecommunications providers.
Contact Us
9+
Major U.S. telecommunications carriers compromised by Salt Typhoon — including AT&T, Verizon, and T-Mobile
FBI / CISA Joint Advisory December 2024
2+ yrs
Duration of Salt Typhoon's undetected access inside U.S. telecom infrastructure — accessing communications of millions of Americans
Senate Commerce Committee Hearing December 2024
Millions
Of Americans whose communications metadata was accessed by Chinese intelligence through the Salt Typhoon breach
FBI / CISA December 2024

A Letter to Telecommunications Leaders

— James Spitler, Founder & CEO, Aktoh Cyber
Salt Typhoon accessed the communications metadata of millions of Americans through persistent, undetected access inside nine major U.S. telecommunications carriers — including the most sensitive communications of political officials, intelligence personnel, and law enforcement. The access lasted more than two years before discovery. Telecommunications is not just another sector under attack. It is the infrastructure through which every other sector communicates — which makes its compromise a national security event. Aktoh deploys autonomous AI detection built for the scale and complexity of telecommunications infrastructure — detecting the patient, persistent access techniques that Salt Typhoon used to remain inside major carriers for over two years.
Contact Us
Nation-State Persistent Access Detection
Salt Typhoon TTP Coverage
Behavioral detection built for the patient, persistent access techniques used by China's Salt Typhoon — detecting the living-off-the-land lateral movement that stayed hidden for 2+ years.
Core Network Infrastructure Protection
Lawful Intercept System Security
Monitor lawful intercept infrastructure, network management systems, and core routing equipment for unauthorized access — the primary target in the Salt Typhoon campaign.
Subscriber Data Protection
Sleight Platform
Deception technology protecting subscriber databases, call records, and metadata — catching nation-state actors before they reach the sensitive communications data they target.
Supply Chain & Equipment Security
Vendor & Hardware Risk
Monitor telecom equipment suppliers, software vendors, and maintenance contractor access for behavioral anomalies indicating supply chain compromise.
CALEA & Regulatory Compliance
Legal Requirements Alignment
Continuous monitoring aligned to CALEA requirements and FCC cybersecurity mandates — with documentation supporting regulatory oversight and national security obligations.
Incident Response for Critical Communications
Service Continuity Planning
Incident response planning that maintains communications continuity during security incidents — because telecom infrastructure cannot be taken offline for security remediation.

Defend Your Future.
Secure Yours Now.

Discover how our expertise keeps your world safe, so you can focus on what matters most.
Next-generation autonomous cybersecurity protecting enterprises worldwide.
Get cybersecurity directly to your inbox
Weekly threat intelligence briefings and product updates.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
© 2026 All rights reserved, Developed by