SecurityCritical InfrastructureFBI Offers $10 Million Bounty for Elusive Salt Typhoon Cybercriminals

FBI Offers $10 Million Bounty for Elusive Salt Typhoon Cybercriminals

The hunt for one of the world’s most sophisticated cyber-espionage groups is heating up, with the FBI offering a record reward for information that could bring them down.

Key Points at a Glance
  • The FBI is offering up to $10 million for information on Salt Typhoon members.
  • Salt Typhoon is linked to major cyber-espionage campaigns targeting critical infrastructure.
  • The group is believed to be affiliated with Chinese state-sponsored hacking activities.
  • Targets have included energy, transportation, and communication sectors worldwide.
  • The reward underscores escalating U.S. efforts to combat nation-state cyber threats.

In a dramatic escalation of its fight against nation-state cyber threats, the FBI has announced a reward of up to $10 million for information leading to the identification or location of individuals associated with Salt Typhoon, a cyber-espionage group accused of targeting critical infrastructure across the globe.

Salt Typhoon, also known by other aliases such as APT40 and Bronze Mohawk, has been linked to a series of sophisticated cyberattacks that have compromised sectors vital to national security — including energy grids, transportation systems, and communication networks. U.S. authorities believe the group operates on behalf of the Chinese government, although official attribution remains politically sensitive.

The $10 million bounty, offered under the U.S. State Department’s Rewards for Justice program, signals the seriousness of the threat Salt Typhoon poses. Officials describe the group’s operations as stealthy, persistent, and highly coordinated — the hallmarks of an advanced persistent threat (APT) actor with significant resources at its disposal.

Salt Typhoon’s methods often involve exploiting vulnerabilities in widely used software platforms, planting hidden backdoors, and using stolen credentials to move laterally through networks. Their goal isn’t simple theft; rather, it’s long-term access to systems that underpin critical national infrastructure, enabling the possibility of sabotage or intelligence gathering during future conflicts.

Security experts say this campaign highlights a worrying evolution in cyber warfare. Whereas earlier attacks were often geared toward immediate financial gain or theft of intellectual property, groups like Salt Typhoon are laying the groundwork for disruptive or destructive operations that could paralyze economies or endanger public safety.

The FBI is urging individuals with credible information about Salt Typhoon operatives or their activities to come forward, stressing that tips can be submitted confidentially and even from outside the United States. The agency hopes that financial incentives — combined with growing international collaboration against cyber threats — will loosen the veil of secrecy that typically shrouds state-sponsored hackers.

This announcement comes amid a broader surge of U.S. government efforts to expose and counter foreign cyber operations. In recent years, American authorities have indicted numerous alleged hackers linked to Russia, Iran, and China, though bringing those individuals to justice often remains elusive due to diplomatic and jurisdictional challenges.

Nevertheless, officials argue that “naming and shaming” campaigns, combined with bounties and sanctions, can make it harder for hackers to operate freely and can serve as a warning to would-be collaborators.

For cybersecurity watchers, the FBI’s bold move against Salt Typhoon represents both a tactical maneuver and a public relations strategy — demonstrating that cyber aggression will not go unanswered, even in the shadowy world of digital espionage.

As the digital battlefield grows ever more complex, the pursuit of groups like Salt Typhoon may shape the future of international security — a future where cybercrime and statecraft are increasingly intertwined.


Source: FBI Internet Crime Complaint Center (IC3)

Jacob Reed
Jacob Reed
A practical analyst specializing in cybersecurity. Delivers technical expertise with clarity and focus.

More from author

More like this

Quantum Randomness Goes Public: How NIST Built a Factory for Unbreakable Numbers

The most secure random numbers ever made—straight from a quantum lab to the public. Discover how NIST’s beacon turns quantum weirdness into the new standard for security and trust.

Discord Links Hijacked to Spread Crypto-Stealing Malware

A new Discord invite link hijacking campaign uses clever tricks and trusted platforms to steal crypto wallets and personal data. Learn how it works—and how to avoid it.

Nation-State Hackers Used ChatGPT to Build Malware

State-backed hackers used ChatGPT to refine malware, automate surveillance, and probe U.S. infrastructure. AI has entered the cyberwar zone.

ChatGPT Logs Court Order Sparks Global Privacy Uproar

A sweeping court order forcing OpenAI to retain all ChatGPT logs—including deleted ones—is sending shockwaves through the tech world and raising urgent privacy alarms.

Latest news

Work Without Worry: How AI Is Changing Well-Being in Modern Offices

Is AI in your office friend or foe? A major global study finds that artificial intelligence can boost well-being and satisfaction—if implemented with people in mind.

Quantum Randomness Goes Public: How NIST Built a Factory for Unbreakable Numbers

The most secure random numbers ever made—straight from a quantum lab to the public. Discover how NIST’s beacon turns quantum weirdness into the new standard for security and trust.

Genesis Waters: How Early Microbes Forged the Path for All Life on Earth

Earth’s earliest microbes shaped the planet and the future of life itself. Discover the explosive breakthroughs that reveal where we came from—and where we might be headed.

From Deadly Fungus to Cancer Fighter: Scientists Transform Nature’s Toxin into a New Drug

What if a fungus blamed for ancient tomb deaths could fight cancer? Discover how Penn engineers turned deadly Aspergillus flavus into a potent leukemia drug—and why it’s just the beginning for fungal medicines.

Revolutionary Magnet Designs: Compact Rings Create Strong, Uniform Fields

A new generation of compact magnet rings generates uniform, powerful fields—no superconductors needed. Discover the design reshaping MRI and beyond.

Unlocking the Alzheimer’s Puzzle: How Insulin Resistance and APOE Disrupt the Brain’s Barrier

Alzheimer’s may begin with a breach in the brain’s own defenses. Discover how genetics and metabolism conspire at the blood-brain barrier—and what it means for the future of dementia care.

Acid Bubbles Revolutionize CO2-to-Fuel: The Simple Hack Extending Green Tech’s Lifespan

Could a simple acid bubble be the key to stable, industrial-scale CO2-to-fuel technology? Discover the fix that keeps green reactors running for months instead of days.

Aging Cells Revealed: How Electrical Signals Can Spot Senescence in Human Skin

Imagine detecting aging skin cells without any labels or stains. Discover how electrical signals can identify senescent cells in real time—and why it’s a game changer for medicine and anti-aging science.

The Secret Advantage: What the Human Brain Can Do That AI Can’t

Can AI ever truly ‘see’ the world like we do? Explore new research showing why human brains remain unbeatable when it comes to recognizing what’s possible in any environment.

Listening to the Universe’s First Light: New Radio Signals Reveal Ancient Stars

How can radio waves from the dawn of time reveal secrets about the universe’s very first stars? Discover how astronomers are listening to the earliest cosmic signals—and what it means for our understanding of the cosmos.