Want to earn $10 million? Easy! All you need to do is have actionable insight on Salt Typhoon, the infamous Chinese hacking collective.
Late last week, the Federal Bureau of Investigation (FBI) posted a new announcement, asking the public to help identify the key people of the notorious Chinese state-sponsored threat actor.
Those who provide the law enforcement agency with proper intel can expect a reward of up to $10 million.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
Bounty rewards
“FBI is issuing this announcement to ask the public to report information about PRC-affiliated activity publicly tracked as “Salt Typhoon” and the compromise of multiple US telecommunications companies, especially information about specific individuals behind the campaign,” the FBI’s announcement reads.
“Investigation into these actors and their activity revealed a broad and significant cyber campaign to leverage access into these networks to target victims on a global scale. This activity resulted in the theft of call data logs, a limited number of private communications involving identified victims, and the copying of select information subject to court-ordered US law enforcement requests.”
The FBI also said that the US Department of State’s Rewards for Justice (RFJ) program is offering a reward of “up to $10 million for information about foreign government-linked individuals participating in certain malicious cyber activities against US critical infrastructure”, in violation of the Computer Fraud and Abuse Act (CFAA).
From the wording of the announcement, it would seem that the bounty stretches beyond Salt Typhoon and into other groups that attacked US critical infrastructure firms. Those would probably include Volt Typhoon as well – another Chinese state-sponsored group that was observed going after the same targets.
Microsoft is tracking multiple “Typhoon” threat actors, all of them from China. These groups, involved in everything from cyber-espionage to sabotage and financial crime, are called Brass Typhoon, Purple Typhoon, Volt Typhoon, Salt Typhoon, Brocade Typhoon, and Salmon Typhoon, to name a few.
Via Cybernews
You might also like
- Salt Typhoon hackers used this clever technique to attack US networks
- Take a look at our guide to the best authenticator app
- We’ve rounded up the best password managers