SecurityCritical InfrastructureFBI Offers $10 Million Bounty for Elusive Salt Typhoon Cybercriminals

FBI Offers $10 Million Bounty for Elusive Salt Typhoon Cybercriminals

The hunt for one of the world’s most sophisticated cyber-espionage groups is heating up, with the FBI offering a record reward for information that could bring them down.

Key Points at a Glance
  • The FBI is offering up to $10 million for information on Salt Typhoon members.
  • Salt Typhoon is linked to major cyber-espionage campaigns targeting critical infrastructure.
  • The group is believed to be affiliated with Chinese state-sponsored hacking activities.
  • Targets have included energy, transportation, and communication sectors worldwide.
  • The reward underscores escalating U.S. efforts to combat nation-state cyber threats.

In a dramatic escalation of its fight against nation-state cyber threats, the FBI has announced a reward of up to $10 million for information leading to the identification or location of individuals associated with Salt Typhoon, a cyber-espionage group accused of targeting critical infrastructure across the globe.

Salt Typhoon, also known by other aliases such as APT40 and Bronze Mohawk, has been linked to a series of sophisticated cyberattacks that have compromised sectors vital to national security — including energy grids, transportation systems, and communication networks. U.S. authorities believe the group operates on behalf of the Chinese government, although official attribution remains politically sensitive.

The $10 million bounty, offered under the U.S. State Department’s Rewards for Justice program, signals the seriousness of the threat Salt Typhoon poses. Officials describe the group’s operations as stealthy, persistent, and highly coordinated — the hallmarks of an advanced persistent threat (APT) actor with significant resources at its disposal.

Salt Typhoon’s methods often involve exploiting vulnerabilities in widely used software platforms, planting hidden backdoors, and using stolen credentials to move laterally through networks. Their goal isn’t simple theft; rather, it’s long-term access to systems that underpin critical national infrastructure, enabling the possibility of sabotage or intelligence gathering during future conflicts.

Security experts say this campaign highlights a worrying evolution in cyber warfare. Whereas earlier attacks were often geared toward immediate financial gain or theft of intellectual property, groups like Salt Typhoon are laying the groundwork for disruptive or destructive operations that could paralyze economies or endanger public safety.

The FBI is urging individuals with credible information about Salt Typhoon operatives or their activities to come forward, stressing that tips can be submitted confidentially and even from outside the United States. The agency hopes that financial incentives — combined with growing international collaboration against cyber threats — will loosen the veil of secrecy that typically shrouds state-sponsored hackers.

This announcement comes amid a broader surge of U.S. government efforts to expose and counter foreign cyber operations. In recent years, American authorities have indicted numerous alleged hackers linked to Russia, Iran, and China, though bringing those individuals to justice often remains elusive due to diplomatic and jurisdictional challenges.

Nevertheless, officials argue that “naming and shaming” campaigns, combined with bounties and sanctions, can make it harder for hackers to operate freely and can serve as a warning to would-be collaborators.

For cybersecurity watchers, the FBI’s bold move against Salt Typhoon represents both a tactical maneuver and a public relations strategy — demonstrating that cyber aggression will not go unanswered, even in the shadowy world of digital espionage.

As the digital battlefield grows ever more complex, the pursuit of groups like Salt Typhoon may shape the future of international security — a future where cybercrime and statecraft are increasingly intertwined.


Source: FBI Internet Crime Complaint Center (IC3)

Enjoying our articles?

We don’t have ads, big sponsors, or a paywall. But we have you. If you'd like to help us keep going — buy us a coffee. It’s a small gesture that means a lot. Click here - Thank You!

Jacob Reed
Jacob Reed
A practical analyst specializing in cybersecurity. Delivers technical expertise with clarity and focus.

More from author

More like this

AI Speeds Up Tornado Recovery with Near-Instant Damage Reports

Texas A&M scientists have created an AI-powered tool that can rapidly assess tornado damage and predict recovery, offering critical insight just hours after a disaster.

Cybersecurity CEO Caught Planting Malware in Hospital Systems

The CEO of a local cybersecurity firm has been arrested for planting malware in a hospital's computer systems, exposing new risks to healthcare cybersecurity.

When Earthquakes Hide Secrets: Seismic Noise and Hidden Explosions

Earthquakes might unintentionally hide underground explosions, complicating global monitoring efforts. New research reveals how seismic noise challenges our ability to detect secret nuclear tests.

Pentagon Investigates Defense Secretary Hegseth’s Use of Signal App

The Department of Defense's Inspector General has initiated an investigation into Secretary Pete Hegseth's use of the Signal app for discussing sensitive military operations, following concerns about potential security breaches.

Latest news

Mother’s Day Solar Storm Supercharged Earth’s Hidden Atmospheric Layers

The 2024 Mother’s Day solar storm didn’t just light up the skies—it triggered elusive metal clouds that could jam signals across the globe, Kyushu University scientists reveal.

How Massless Particles May Have Transformed into Dark Matter

A Dartmouth theory suggests dark matter was born when light-speed particles suddenly condensed and became heavy—leaving a mark we might soon detect.

A Cancer Treatment Breakthrough the Size of a Nanoparticle

A smart nanoparticle from OHSU delivers drugs and ultrasound energy to tumors—shattering cancer cells with less risk and more precision.

Australia’s Oldest Tree Frog Leaps Back 55 Million Years

A fossil tree frog from 55 million years ago is changing everything we thought we knew about Australia’s amphibians—and may hold clues for saving today’s frogs.

Autistic Communication Works—Just Differently

A landmark study finds autistic people communicate just as effectively as others—redefining autism from a social deficit to a difference in style.

No Two Mothers Alike: Orangutans Reveal Unique Parenting Styles

Orangutan mothers each have their own unique parenting style, a long-term study reveals—suggesting maternal personality may not be exclusive to humans.

AI Speeds Up Tornado Recovery with Near-Instant Damage Reports

Texas A&M scientists have created an AI-powered tool that can rapidly assess tornado damage and predict recovery, offering critical insight just hours after a disaster.

Fitness and Mortality: Are We Overestimating the Link?

A massive Uppsala University study challenges long-held beliefs about fitness and lifespan—suggesting the benefits may be smaller, and more complex, than we thought.

Coastal Lagoons Are Turning into Salty Soup

University of Adelaide research shows climate change is turning coastal lagoons into salty dead zones—but timely freshwater interventions can reverse the damage.

Broken Heart Syndrome Proves Deadlier Than Expected

A new five-year study reveals that “broken heart syndrome” poses a much higher risk of death and complications than previously thought—especially among men.