Who is Volt Typhoon?
The low-profile group has been active since 2021, but little is still known about its capabilities. Volt Typhoon has reportedly hit communications, manufacturing, utility, transportation, construction, maritime, government, information technology and education sectors in this operation. It’s not clear how long the threat activity has been ongoing. It’s difficult to argue that the moves by China aren’t geopolitical in nature. The hacking comes as U.S. security forces have steadily moved to shore up critical infrastructure defenses and the geopolitical climate has heated up with words between Washington and Beijing over the sanctity of Taiwan.Indeed, the targets include sites in Guam, where the U.S. has a major military presence, Microsoft said in a blog post. The vendor’s security arm believes that the attacks, which appear to be preparatory espionage rather than all out disruptive, are focused mainly on reconnaissance.In the blog post, Microsoft said that because Volt’s activity relies on valid accounts and living-off-the-land tactics, “detecting and mitigating this attack could be challenging.” The company has already posted the code that would make it possible for corporate users, manufacturers and others to detect and remove it, the New York Times reported. According to Microsoft, Volt puts strong emphasis on stealth to maintain its persistence in the network:“They issue commands via the command line to (1) collect data, including credentials from local and network systems, (2) put the data into an archive file to stage it for exfiltration, and then (3) use the stolen valid credentials to maintain persistence.”Sophos Security Expert Explains Cybercrime Operation
Security providers are weighing in on the security events. John Shier, Sophos field chief technology officer, explained how state-backed adversaries operate in much the same manner as other cyber criminals:“Much like cybercriminals, nation-state adversaries also use living-off-the-land binaries to achieve their goals. CISA's latest Cybersecurity Advisory on Volt Typhoon identified the same tools being used as we reported on in our latest Active Adversary report on cybercriminal tools and behaviors. Since many threat actor activities rely on valid credentials and LOLBins, detection and mitigation can be challenging."Such is the challenge that organizations today require proactive protection, constant monitoring and a rapid response to suspicious signals. Organizations that invest in the technologies and people required to defend against attacks by nation-state adversaries will also be well positioned to defend against even the most experienced cybercriminals.”Additionally, and of significant concern, Volt tries to blend into normal network activity by routing traffic through compromised small office and home office (SOHO) network equipment, including routers, firewalls and VPN hardware, and using custom versions of open-source tools to establish a command and control (C2) channel over proxy to further stay under the radar, Microsoft said.CISA, NSA Issue Warning
Such is the concern over Volt that the National Security Agency, CISA and similar organizations from Australia, Canada, the U.K. and New Zealand issued a bulletin warning organizations of the activity.As the bulletin stated:“The United States and international cybersecurity authorities are issuing this joint Cybersecurity Advisory (CSA) to highlight a recently discovered cluster of activity of interest associated with a People’s Republic of China (PRC) state-sponsored cyber actor, also known as Volt Typhoon. Private sector partners have identified that this activity affects networks across U.S. critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these and other sectors worldwide."