APT Profile: Volt Typhoon

As cyber currents ebb and flow, a storm named Volt Typhoon surges from the digital depths. This isn’t your typical tempest from the sea but a state-sponsored maelstrom with a tendency for espionage. Volt Typhoon, believed to be backed by the Chinese government, stands out for its sophisticated tactics and high-profile targets. This group has been at the forefront of several cyber-espionage campaigns, targeting critical infrastructures, governmental bodies, and private sectors across various nations.

Threat actor card of Volt TyphoonThreat actor card of Volt Typhoon

In this article, we will delve deep into the operations, objectives, and techniques of the Volt Typhoon, shedding light on their way of working and the potential threats they pose.

Who is the Volt Typhoon?

Volt Typhoon (or BRONZE SILHOUETTE) is a sophisticated state-sponsored Advanced Persistent Threat (APT) group widely believed to have its origins in China. Over the past few years, their cyber activities have been closely monitored and documented by various cybersecurity firms, intelligence agencies, and government bodies worldwide.

The group is believed to have been operating since 2021 but is mostly active in May 2023.

Illustration of Volt Typhoon (generated using DALL-E 3)Illustration of Volt Typhoon (generated using DALL-E 3)

The group primarily focuses on intelligence gathering, with a keen interest in both governmental and private sectors. The group’s operations are characterized by precise planning, custom malware deployments, and stealthy infiltration techniques, making them one of the most formidable cyber adversaries nowadays.

Their alleged backing by a nation-state not only provides them with advanced resources but also potentially aligns their objectives with geopolitical interests, further amplifying the threat they pose.

How does the Volt Typhoon attack?

The success of the Volt Typhoon in infiltrating high-profile targets can be attributed to their diverse and evolving attack methodologies. Here’s a breakdown of some of their most notable techniques:

Living off the Land (LotL) Techniques: Volt Typhoon is adept at using legitimate tools and processes present on the target system to carry out their malicious activities. By leveraging these tools, they can effectively blend in with regular network activities, making their detection significantly more challenging.

Attack diagram of Volt Typhoon (Source: Microsoft)Attack diagram of Volt Typhoon (Source: Microsoft)

Spear Phishing: One of their primary infiltration methods involves crafting highly customized phishing emails tailored to lure specific individuals or departments within an organization. These emails often contain malicious attachments or links, leading to web pages that deploy exploit techniques.

Exploiting Known Vulnerabilities: The group is known to keep an eye on public vulnerability disclosures. They act swiftly to exploit these vulnerabilities before organizations can patch them, gaining unauthorized access to systems.

CVEs exploited by Volt Typhoon (Source: SOCRadar)CVEs exploited by Volt Typhoon (Source: SOCRadar)

When looking at the vulnerabilities exploited by the group, it is possible to say that they mostly exploited the Zoho Management vulnerabilities (CVE-2021-27860 and CVE-2021-40539) observed in 2021, and the Papercut vulnerability (CVE-2023-27350) that came to the agenda in 2023.

CVE-2023-27350’s information card in SOCRadar XTI’s Vulnerability Intelligence page under the CTI module (Source: SOCRadar)CVE-2023-27350’s information card in SOCRadar XTI’s Vulnerability Intelligence page under the CTI module (Source: SOCRadar)

Custom Malware Deployment: Volt Typhoon has developed a range of custom malware tools tailored for specific tasks, from maintaining persistence on a compromised system to data exfiltration. Their malware often exhibits advanced evasion techniques to bypass traditional security solutions.

Credential Harvesting: Once inside a network, the group often seeks to gather credentials, which can be used to move laterally across the network, accessing more systems and escalating privileges.

What are the Targets of the Volt Typhoon?

Volt Typhoon’s targeting pattern reveals a strategic approach, focusing on entities that can provide them with valuable intelligence or offer geopolitical advantages. Their targets span across various sectors and regions:

SOCRadar XTI’s CTI Module Threat Actor/Malware information page of the Volt Typhoon (Source: SOCRadar)SOCRadar XTI’s CTI Module Threat Actor/Malware information page of the Volt Typhoon (Source: SOCRadar)

Targeted Sectors:

Defense: Military installations, defense contractors, and research institutions have been prime targets, likely to gather intelligence on defense capabilities, strategies, and emerging technologies.

Energy: The group has shown interest in energy sectors, including power grids and oil & gas installations. Compromising such entities can provide both intelligence and potential disruption capabilities.

Telecommunications: Telecom sectors offer a wealth of data, from communication intercepts to infrastructure details, making them a valuable target.

Critical Infrastructure: Beyond energy, other critical infrastructures like transportation, water supply, and healthcare have also been in their crosshairs.

Targeted Countries: 

While the U.S. remains a primary target for Volt Typhoon, their activities have not been limited to one region. Evidence suggests operations in various parts of Europe, Asia, and other regions. Their targeting pattern often aligns with geopolitical events or tensions, suggesting a strategic approach to their campaigns.

The broad spectrum of their targets underscores Volt Typhoon’s capabilities and the potential threat they pose to global security and stability.

Notable operations of Volt Typhoon:

Volt Typhoon’s cyber campaigns have left a significant mark on the global cybersecurity landscape. Here are some of their most notable operations:

U.S. Critical Infrastructure Compromise: One of the most alarming campaigns involved the group targeting U.S. critical infrastructure. Leveraging LotL techniques, they infiltrated several key installations, raising concerns about potential disruptions and the safety of critical services.

Volt Typhoon’s Campaign targeting U.S. Critical Systems: Information page in SOCRadar LABSVolt Typhoon’s Campaign targeting U.S. Critical Systems: Information page in SOCRadar LABS

Espionage Campaigns: Volt Typhoon has been linked to a series of cyber-espionage campaigns targeting defense organizations, governmental entities, and private sectors. These campaigns often involve the theft of sensitive data, intellectual property, and strategic information.

Asia’s National Grid Attack: In a bold move, the group compromised a national grid in an Asian country, maintaining their presence for several months. This operation highlighted their capability to infiltrate and potentially disrupt essential services in a nation.

Credential Theft and Lateral Movement: In multiple instances, the group has demonstrated its prowess in stealing credentials from compromised systems and using them to move laterally across networks. As a result, they can access more systems, escalate privileges, and deepen their foothold.

Use of Custom Malware Tools: Several of their operations have unveiled the use of custom malware tools tailored for specific tasks. These tools often exhibit advanced evasion and persistence techniques, therefore making them challenging to detect and remove.

These operations provide a glimpse into the group’s capabilities, objectives, and the potential threats they pose. Their strategic targeting and advanced techniques underscore the need for robust cybersecurity measures to counter such threats.

Conclusion

The emergence and activities of state-sponsored threat actors like Volt Typhoon underscore the intricate and evolving nature of the cyber threat landscape. With nation-states leveraging advanced cyber capabilities for espionage, influence, and potential sabotage, the challenges for defenders have never been more pronounced. Volt Typhoon, with its alleged state backing and sophisticated modus operandi, represents a clear and present danger to global security, stability, and economic interests. As their campaigns continue to unfold, it becomes imperative for nations, organizations, and individuals to understand the threat they pose and take proactive measures to safeguard their digital assets and interests.

Security Recommendations against Volt Typhoon:

In light of the significant threat posed by Volt Typhoon, organizations and individuals must adopt a proactive and layered approach to cybersecurity. Here are some recommended measures to counter the threats from this formidable group:

Regular Updates and Patching: Ensure that all software, operating systems, and hardware are regularly updated. Promptly apply security patches to mitigate known vulnerabilities that could be exploited.

Employee Training: Conduct regular cybersecurity awareness training for employees. Emphasize the dangers of spear-phishing and teach them how to recognize and report suspicious emails or activities.

Implement Multi-factor Authentication (MFA): Use MFA wherever possible, especially for accessing critical systems and sensitive data. This adds an additional layer of security, even if credentials are compromised.

Network Segmentation: Segment your network to ensure that if one section is compromised, the threat actor cannot easily move laterally to other parts of the network.

Advanced Threat Detection: Employ advanced threat detection solutions that can identify and counter sophisticated threats in real-time. Consider solutions that use artificial intelligence and machine learning for enhanced detection capabilities.

Regular Backups: Regularly back up critical data and ensure that backups are stored in a secure location, isolated from the main network. This ensures data availability even in the event of a ransomware attack or data breach.

Incident Response Plan: Have a well-defined incident response plan in place. Ensure that all employees are familiar with the plan and know the steps to take in the event of a security breach.

Limit Privileged Access: Adopt the principle of least privilege. Ensure that only necessary personnel have access to critical systems and data, and regularly review and update access permissions.

By adopting these measures and maintaining a proactive security posture, organizations can significantly reduce the risk of falling victim to Volt Typhoon’s cyber campaigns and safeguard their assets against potential threats.

IoCs Related to Volt Typhoon

IP

104.161.54[.]203

IP

109.166.39[.]139

IP

23.227.198[.]247

CVE

CVE-2021-27860

CVE

CVE-2021-40539

CVE

CVE-2023-27350

HASH

ef09b8ff86c276e9b475a6ae6b54f08ed77e09e169f7fc0872eb1d427ee27d31

HASH

d6ebde42457fe4b2a927ce53fc36f465f0000da931cfab9b79a36083e914ceca

HASH

d6ab36cb58c6c8c3527e788fc9239d8dcc97468b6999cf9ccd8a815c8b4a80af

HASH

e453e6efc5a002709057d8648dbe9998a49b9a12291dee390bb61c98a58b6e95

HASH

7939f67375e6b14dfa45ec70356e91823d12f28bbd84278992b99e0d2c12ace5

For more IOCs, you can visit the Threat Actor/Malware page under the CTI module of SOCRadar XTI Platform.

MITRE ATT&CK TTPs of Volt Typhoon

Technique

ID

Resource Development

 

Compromise Infrastructure: Server

T1584.004

Compromise Infrastructure: Botnet

T1584.005

Obtain Capabilities: Tool

T1588.002

Initial Access

 

Exploit Public-Facing Application

T1190

Execution

 

Command and Scripting Interpreter: PowerShell

T1059.001

Command and Scripting Interpreter: Windows Command Shell

T1059.003

Windows Management Instrumentation

T1047

Persistence

 

Server Software Component: Web Shell

T1505.003

Defense Evasion

 

Indicator Removal: File Deletion

T1070.004

Indicator Removal: Clear Network Connection History and Configurations

T1070.007

Masquerading: Match Legitimate Name or Location

T1036.005

Masquerading: Masquerade File Type

T1036.008

Valid Accounts: Domain Accounts

T1078.002

Virtualization/Sandbox Evasion: System Checks

T1497.001

Credential Access

 

Credentials from Password Stores

T1555

OS Credential Dumping: LSASS Memory

T1003.001

OS Credential Dumping: NTDS

T1003.003

Discovery

 

Account Discovery: Domain Account

T1087.002

Log Enumeration

T1654

Permission Groups Discovery: Local Groups

T1069.001

Permission Groups Discovery: Domain Groups

T1069.002

Process Discovery

T1057

Query Registry

T1012

Remote System Discovery

T1018

Software Discovery

T1518

System Information Discovery

T1082

System Network Configuration Discovery

T1049

System Network Connections Discovery

 

System Owner/User Discovery

T1033

Collection

 

Archive Collected Data: Archive via Utility

T1560.001

Data from Local System

T1005

Data Staged

T1074

Local Data Staging

T1074.001

The post APT Profile: Volt Typhoon appeared first on SOCRadar® Cyber Intelligence Inc..

Article Link: APT Profile: Volt Typhoon