Volt Typhoon: Analyzing Espionage Campaigns Against Critical Infrastructure

Volt Typhoon: Analyzing Espionage Campaigns Against Critical Infrastructure

Volt Typhoon, a Chinese state-sponsored APT group, is known for targeting critical infrastructure in the US, UK, Canada, and Australia by exploiting vulnerabilities in outdated SOHO devices. Their stealthy tactics involve using legitimate tools to blend malicious activities with normal network traffic, making detection difficult. Affected: United States, United Kingdom, Canada, Australia

Keypoints :

  • Volt Typhoon is linked to espionage and information gathering targeting critical infrastructure.
  • The group exploits vulnerabilities in end-of-life SOHO devices like routers and firewalls.
  • They utilize advanced stealth techniques and living-off-the-land tactics to avoid detection.
  • Custom tools like fy.sh and Fast Reverse Proxy are part of their arsenal.
  • Mitigation strategies include hardening devices, applying patches, and enforcing MFA.

MITRE Techniques :

  • Reconnaissance (T1087): Conducting extensive reconnaissance to identify vulnerable SOHO devices.
  • Exploitation (T1203): Exploiting vulnerabilities like CVE-2019–1652 and CVE-2021–40539 to gain access.
  • Credential Dumping (T1003): Using tools like Mimikatz and Impacket to extract credentials from LSASS memory.
  • Command and Control (T1071): Utilizing compromised SOHO devices for command and control traffic.
  • Data Exfiltration (T1041): Collecting and staging sensitive data for exfiltration.

Indicator of Compromise :

  • [file hash] eaef901b31b5835035b75302f94fee27288ce46971c6db6221ecbea9ba7ff9d0
  • [file hash] 4bcedac20a75e8f8833f4725adfc87577c32990c3783bf6c743f14599a176c37
  • [tool name] fy.sh
  • [tool name] Mimikatz
  • [tool name] Impacket
  • Check the article for all found IoCs.

Full Research: https://medium.com/@ksinclair6/volt-typhoon-breaking-down-espionage-campaigns-targeting-critical-infrastructure-2b2c58214730?source=rss——cybersecurity-5