CyberTalk

‘Volt Typhoon’ infiltrates U.S. critical infrastructure organizations

Cyber space and infrastructure concept art

EXECUTIVE SUMMARY:

The state-sponsored cyber criminal group known as ‘Volt Typhoon’ has launched a new series of cyber attacks that have affected communications, manufacturing, utility, transportation, information technology and education sectors within the U.S. 

Microsoft identified stealthy and targeted malicious behavior focused on post-compromise credential access and network system discovery. The attacks were launched for espionage and intelligence gathering purposes.

Microsoft assesses with “moderate confidence” that this Volt Typhoon campaign may be used for the purpose of evaluating how to disrupt critical communications infrastructure between the United States and Aisa during future regional crises.

Attack details

In compromising U.S. infrastructure, Volt Typhoon placed emphasis on stealth. The group relied almost exclusively on the living-off-the-land techniques and hands-on keyboard activity.

The group members issue commands via the command line to a) collect data, including credentials from local and network systems b) place data into an archive file to stage it for exfiltration and c) leverage the stolen credentials to establish persistence.

Volt Typhoon attempts to cover its tracks by routing traffic through compromised small office and home office (SOHO) network equipment, including routers, firewalls and VPN hardware. The group has also been observed employing custom versions of open-source tools to establish a command and control (C2) channel over proxy, helping it remain under the radar.

Attack mitigation

Because Volt Typhoon relies on living-off-the-land binaries (LOLBins), identifying and stopping attacks could be challenging. Detecting activity that relies on normal sign-in channels and system binaries demands behavioral monitoring. Remediation requires account modifications or credential updates.

Microsoft has directly notified targeted or compromised customers and has provided them with critical information that can assist with securing environments. The tech giant is continuing to track and respond to Volt Typhoon activities, along with those of other state-sponsored threat groups. The goal is to keep systems safe.

Threat prevention

The Volt Typhoon intrusion campaign may be aggressive, but there’s no indication that more destructive or disruptive cyber attacks are in the works. Nonetheless, you’ll want to prevent the threat presented by Volt Typhoon and related threats. Here’s where to start:

For more insights into this story, please see this blog and/or CyberTalk.org’s supplemental coverage. To receive more cutting-edge cyber security news, best practices, analyses and leadership insights, please sign up for the CyberTalk.org newsletter.

Exit mobile version