top of page

BLOG

Your source for insights from our team on secure communications and encryption,
as well as tips and tricks to get the most from using Cellcrypt

From the Frying Pan to the Fire: Why Consumer 'Secure' Messaging Apps Are NOT the Solution in a Post-Salt Typhoon World

Writer's picture: CELLCRYPTCELLCRYPT


The Salt Typhoon cyberattacks represent a pivotal moment for organizations in critical infrastructure, enterprise, and government sectors. These sophisticated attacks exposed fundamental vulnerabilities in global telecommunications networks and interconnected systems. They demonstrated the advanced capabilities of state-sponsored threat actors to compromise trusted communication channels and public-facing infrastructure.


In the wake of Salt Typhoon, as network operators struggle to mitigate the damage caused, US officials are now recommending the use of encrypted messaging and communications whenever possible to protect information from data-in-transit theft and eavesdropping.


"Encryption is your friend – whether it is on text messaging or if you have the capacity to use encrypted voice communications," Jeff Greene, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), said. "Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible, if not really hard, for them to detect it. So, our advice is to try to avoid using plain text."


However, while organizations may be inclined to switch to popular consumer messaging apps like WhatsApp or Signal for encrypted communications, they should carefully consider 'How secure is WhatsApp or Signal for enterprise/government use?'.


While these apps, from major tech companies, are known for their user-friendly design and implementation of end-to-end encryption, they are ill-equipped to protect against the complex risks and advanced threat vectors that are now pervasive in enterprise and government environments.


The exploits used in Salt Typhoon, including compromising public-facing servers, leveraging legitimate admin tools for covert lateral movement, infiltrating lawful intercept systems, exploiting trust between networks, and potentially manipulating supply chains, reveal that truly secure communications demand more than just an extra layer of encryption.


Effective protection requires a dedicated, enterprise-grade platform that is engineered from the ground up with robust security controls, operational resiliency, regulatory compliance, and rapid incident response capabilities.


This article examines how the Salt Typhoon attacks underscore the shortcomings of repurposing consumer messaging apps for high-security environments and why moving from one communication solution to another simply exchanges one set of vulnerabilities for a different, maybe equivalent, but equally concerning set of risks.


Finally, we make the case for adopting purpose-built, enterprise-grade secure communication platforms like Cellcrypt, which provide enhanced encryption, flexible deployment models, granular administrative oversight, and proactive security measures such as quantum-resistant cryptography and seamless policy enforcement.


The Sophistication of Salt Typhoon Tactics

Salt Typhoon, attributed to a highly capable state-sponsored Advanced Persistent Threat (APT) group, executed a multifaceted campaign that breached critical telecommunications infrastructure and public-facing systems.


The attack was notable for its use of multiple sophisticated tactics:


  1. The Exploitation of Public-Facing Server, Vulnerabilities

    The attackers took advantage of zero-day flaws or unpatched vulnerabilities in public-facing systems such as Ivanti Connect Secure to gain initial access to target networks. This allowed them to establish covert footholds from which to launch further attacks.


  2. Lateral Movement Using Legitimate Tools

    Once inside networks, Salt Typhoon stealthily spread using trusted administrative tools like Windows Management Instrumentation Console (WMIC). By leveraging legitimate tools, the attackers were able to evade traditional security monitoring and blend in with regular network activity.


  3. Compromise of Wiretap Systems

    In a particularly alarming development, the attackers managed to gain access to lawful interception systems (CALEA) used by telecom providers. This enabled them to potentially eavesdrop on sensitive voice and data communications meant to be restricted to authorized law enforcement surveillance.


  4. Exploitation of Trust Between Networks

    Salt Typhoon took advantage of the complex web of interconnectivity and peering relationships between telecom networks. By abusing these trusted connections, the attackers effectively bounced between different networks, significantly extending the reach and impact of their campaign.


  5. Possible Supply Chain Compromise

    Although not definitively confirmed, the level of sophistication exhibited by Salt Typhoon suggests the adversaries may have compromised software, hardware, or firmware supply chains used by telecommunications providers. This would have provided them with additional vectors to bypass security controls.


The implications of Salt Typhoon are profound. It's now evident that conventional security measures and popular off-the-shelf encryption apps are woefully inadequate against the stealth, persistence, and complexity of modern nation-state cyber threats. There is an urgent need for purpose-built communication platforms that provide defense-in-depth, leverage the latest security advances, and can adapt to counter constantly evolving adversary tactics.


Why Consumer "Secure" Messaging Apps Fall Short

While consumer messaging apps like WhatsApp and Signal are popular for their easy-to-use encrypted messaging, they were never designed to withstand APT-level attacks targeting enterprises and governments. Multiple aspects of their architecture, reliance on public infrastructure, and limited enterprise management capabilities leave them ill-suited for mission-critical secure communication. Here, we examine the tactics employed by Salt Typhoon and how consumer-grade apps are equally vulnerable to these types of exploits.


Vulnerability to Public-Facing Server Exploits

Salt Typhoon Tactic: Gaining initial access by exploiting public-facing servers and appliance vulnerabilities.


Encrypted messaging apps like WhatsApp and Signal implement end-to-end encryption, but their server infrastructure is still exposed to the public Internet. A compromise of their servers or takeover of message routing channels could allow highly capable adversaries to disrupt communications or selectively degrade service.


WhatsApp has also experienced security flaws that allowed remote code execution on its servers in the past. Even Signal, while open-source and security-audited, still relies on centralized services, which remain prime targets for well-resourced attackers aiming to undermine the platform's integrity.


Metadata Leakage Despite Encryption

Salt Typhoon Tactic: Infiltrating lawful interception systems to gain access to sensitive communication records and metadata.


Both WhatsApp and Signal generate metadata like IP addresses, phone numbers, and message timestamps that can reveal highly sensitive information about contacts and communication patterns even without access to message contents.


WhatsApp's metadata leakage is even more concerning because the app integrates closely with the mobile device's contact list and relies heavily on phone numbers as user identifiers. Similarly, Google Messages generates metadata that can be exploited despite its encryption features. The danger multiplies further when the metadata from these apps gets vacuumed up by global telecom infrastructure and routing systems outside the control of enterprises.


Susceptibility to Manipulated Routing and Connectivity

Salt Typhoon Tactic: Leveraging trust relationships between different networks to expand attacker reach via manipulated routing (i.e. BGP hijacking).


WhatsApp and Signal rely fundamentally on the public internet backbone, global DNS infrastructure, and third-party content delivery networks (CDNs) to transmit messages between different devices and regions. Highly sophisticated adversaries can potentially exploit blind spots in these trust relationships through tactics like rerouting data flows or launching man-in-the-middle interception attacks. Even with encryption in place, attackers faking or manipulating connectivity paths can effectively block, slow down, or selectively allow communications to disrupt operations and gain a situational advantage.


Consumer apps offer little to no enterprise control or custom routing options to counter these advanced network-level attacks, and their security features may not be sufficient to address these vulnerabilities.


Providing a False Sense of Security

Salt Typhoon Tactic: Covering up evidence of infiltration and data exfiltration within the "noise" of legitimate user communications.


One of the most pernicious aspects of these messaging apps in sensitive environments is that they can instill a false sense of security among high-value targets. Users may feel protected because their messages are "end-to-end encrypted", not realizing that resourceful adversaries have numerous other ways to access their communications.


The apps provide a side channel that sophisticated attackers can then silently monitor or infiltrate with advanced malware, confident that users will discuss sensitive topics. This creates an extremely attractive "honeypot" for hostile intelligence gathering and data exfiltration that's psychologically masked by the apps' encryption promises.



The Historical Trail of Compromises


Far from hypothetical, several high-profile security incidents have already proven how vulnerable telephone networks, as well as enterprise and consumer messaging apps, can be against determined attackers, underscoring the need for enterprise-grade secure communication tools to protect sensitive information:


  • Operation Socialist (2010-2013): Leaked documents revealed how Britain's GCHQ successfully infiltrated the networks of Belgacom (now Proximus), a major Belgian telecom company. The agency gained access to Belgacom's employees' computers and private communications, likely including popular consumer messaging apps. This showed that even strong encryption is moot if the underlying network gets compromised.


  • Android FakeSMS Malware (2021): Researchers discovered new Android malware called FakeSMS that targets messaging and social media apps like WhatsApp, WeChat, and Twitter. The malware spread via trojanized Android app stores and used fake sign-in overlays to steal credentials and session keys. This highlighted the risk of malicious apps abusing the accessibility features of mobile operating systems.


  • SolarWinds Supply Chain Breach (2020): Russian intelligence hackers pulled off a massive supply chain attack by compromising the update infrastructure of SolarWinds' Orion IT management software. The tainted updates provided a foothold to breach hundreds of organizations and government agencies. The same supply chain risk could easily apply to the auto-update mechanisms of any consumer messaging app.


  • WhatsApp's CEO-impersonation Hack (2019): Security researchers demonstrated a clever social engineering attack against WhatsApp's verification system. They used a rogue phone number and other tricks to impersonate another user's account and access their contact list and messages. This proved that encryption alone does not stop some very low-tech threats.


The Importance of User Education and Training

While implementing secure messaging apps is crucial, investing in comprehensive user education and training programs is equally important. Even the most advanced security technology can be undermined by human error or lack of awareness.


Regular training sessions should cover topics like:

  • Identifying and reporting phishing attempts

  • Proper handling of confidential information

  • Safe use of mobile devices and public Wi-Fi networks

  • Recognizing signs of potential device compromise

  • Incident reporting procedures


By cultivating a culture of security awareness, organizations can significantly reduce the risk of user-induced vulnerabilities. Employees should be empowered to act as the first line of defense against cyber threats, complementing the technical safeguards provided by enterprise-grade secure messaging apps.


Why Cellcrypt Is the Solution

In contrast to the band-aid of consumer apps, Cellcrypt offers a secure communication platform built from scratch for enterprise and government needs. It's designed with full understanding that sophisticated adversaries can simultaneously attack multiple layers of the communication stack—device, network, server, supply chain—while exploiting lawful interception processes and trusted connections.


Cellcrypt delivers a cohesive, defense-in-depth approach to security through the following capabilities:


Full Deployment Control

On-Premises, Private Cloud or Offline (Dark) Installs

Cellcrypt can be fully deployed on an organization's infrastructure or within dedicated, secure cloud environments. This provides complete control and sovereignty over message routing, cryptography, and server configurations—an absolute necessity for the most sensitive communications.


Hardened End-to-End Encryption with Post-Quantum Protection

Military-Grade Encryption

Cellcrypt utilizes NSA-recommended CNSA 2.0 encryption with FIPS-validated cryptographic algorithms, including ChaCha20, AES-256, Elliptic Curve Cryptography, and other standardized algorithms trusted by military and intelligence agencies globally.


Post-Quantum Cryptography

With quantum computing on the horizon, encrypting data using quantum-proof methods is becoming increasingly critical. Once large-scale quantum computers become available, they could potentially break many of today's encryption algorithms.


Cellcrypt was the first secure communications solution to integrate quantum-resistant algorithms and new post-quantum cryptographic standards, ensuring information stays shielded far into the future. Cellcrypt's forward-thinking approach ensures that organizations' sensitive communications will remain secure even in a post-quantum era.


Compliance and Information Governance

Granular Metadata Management

Cellcrypt provides full administrative control and auditability over metadata storage, user identity management, and encryption key lifecycles. This ensures full compliance with data protection regulations like GDPR and HIPAA.


Enforceable Security Policies

Admins can define and universally enforce custom security policies, strictly control network access, and set granular authentication and authorization rules for individual users and devices—a level of governance impossible with consumer apps.


Incident Response Readiness

Segmented Crisis Communications

Cellcrypt's out-of-band, cryptographically segregated communication channels allow for real-time incident response coordination without alerting attackers if primary networks are compromised or disrupted. Cellcrypt's ability to provide secure crisis communications during an active incident is invaluable, ensuring that sensitive response efforts are shielded from attackers.


Full-Stack Security Integration for Enterprise Communication

Unified Oversight and Enforcement

Cellcrypt offers APIs and turnkey integrations with Identity and Access Management (IAM), Security Information and Event Management (SIEM), and Mobile Device Management (MDM) platforms for coherent, full-stack security orchestration.


Continuous Posture Assurance

Updated security policies can be centrally promulgated as new threats emerge and automatically pushed to endpoints. This ensures continuous alignment with industry, government, and organizational compliance standards.


Recommendations

The post-Salt Typhoon cybersecurity landscape demands that organizations—especially those in government and critical infrastructure sectors—drastically improve their communication security approach. Simply swapping one vulnerable communications solution for another is akin to jumping from the frying pan into the fire.


Given the tenacity and resources of state-level adversaries, secure communication platforms must prioritize security and resiliency across multiple fronts:


Conduct Comprehensive Risk Assessments

Perform in-depth analyses of your current messaging platforms. Pay close attention to hidden dependencies on public communication backbones. Evaluate platforms against APT-level attack techniques as demonstrated in Salt Typhoon. A thorough risk assessment is the foundation for any effective security strategy. It helps organizations identify their most critical assets, understand the threats they face, and prioritize their defenses accordingly.


Implement Defense-in-Depth

Secure communications cannot rely only on encryption. Embrace solutions that provide end-to-end encryption at the application layer with network-level encryption, cross-platform key management, and granular access policies across the full communication stack, including phone calls. Defense-in-depth is a security approach that layers multiple, overlapping controls so that if one fails, others still stand. It's about putting up as many barriers as possible between your data and potential attackers.


Adopt True Zero-Trust Principles

Traditional zero-trust models actually mean verifying everything. However, even the most secure networks built around zero-trust principles can still be compromised. Look for solutions that are designed to be fully secure, even within compromised networks.

True Zero-Trust means exactly what the name implies: trust nothing!


Gain Full Deployment Control

Strongly consider on-premises or private cloud deployment models for your most sensitive communications. Maintain full custody of encryption keys, user directories, and security configurations. When you control the infrastructure end-to-end, you dramatically reduce the risk of unauthorized access or manipulation. You're no longer relying on the security practices of third-party service providers.


Prepare for Post-Quantum Cryptography

As quantum computers inch closer to reality, begin adopting quantum-resistant cryptographic standards. Prioritize solutions that offer hybrid post-quantum schemes and crypto-agility. While still a nascent field, post-quantum cryptography is rapidly maturing. Organizations that start preparing now will be well-positioned to withstand the quantum threats of tomorrow.


Conclusion

The Salt Typhoon attacks must serve as a forceful wake-up call for any organization looking to secure its most sensitive communications. While apps like WhatsApp and Signal provide a thin veneer of encryption, they are fatally outflanked by the multi-pronged tradecraft of state-sponsored advanced attackers. Clinging to these apps is clinging to a false sense of security.


In an era of highly organized, militarized hacking campaigns, truly secure communications demand a platform built uncompromisingly with government and enterprise needs at its core. A purpose-built solution engineered with defense-in-depth, resilient connectivity, granular compliance enforcement, and turnkey integration into full-spectrum cyber defenses.


Cellcrypt offers exactly such a platform. It extends far beyond the one-dimensional "end-to-end encryption" of consumer apps to deliver quantum-resistant encryption, complete deployment control, policy-based governance, and real-time investigative capabilities. It enables organizations to erect an adaptable bulwark around their communications against ever-evolving threats.


With the critical inadequacy of using consumer secure messaging apps in a post-Salt Typhoon world, it's no longer about simply patching a vulnerability. It's about spearheading a strategic shift towards resilient, enterprise-class communication platforms that can shield national interest, corporate intellectual property, and sensitive government operations against a new chapter of cyber aggression.


The time to secure that future is now.


bottom of page