Table of Contents
March 11, 2025
|
10m

Volt Typhoon APT


A futuristic cityscape with glowing neon-lit buildings and a digital data stream emerging from a structure, symbolizing cybersecurity and AI-powered infrastructure.

Volt Typhoon is a state-sponsored Advanced Persistent Threat (APT) group operating on behalf of the People's Republic of China (PRC). This group has garnered significant attention due to its focus on targeting critical infrastructure organizations within the United States and its territories. Unlike traditional cyber espionage campaigns focused on data theft, Volt Typhoon's primary objective appears to be pre-positioning for potential disruptive or destructive cyberattacks against critical infrastructure in the event of a major geopolitical crisis or conflict. This strategic objective, combined with the group's sophisticated "living off the land" techniques, makes them a particularly dangerous and challenging threat to detect and mitigate. The group's activities have prompted joint advisories from multiple US government agencies and international partners, underscoring the severity of the threat.

Origins & Evolution

Volt Typhoon was first publicly identified in mid-2021, although evidence suggests the group had been operating undetected for a considerable period before that, potentially for at least five years in some compromised networks. The group is believed to be linked to the Chinese government, specifically tasked with gaining and maintaining access to critical infrastructure networks. This attribution is based on a combination of technical indicators, targeting patterns, and intelligence assessments by multiple cybersecurity firms and government agencies.

Volt Typhoon goes by several aliases, reflecting the challenges in tracking and attributing APT groups. These aliases include:

  • VANGUARD PANDA

  • BRONZE SILHOUETTE

  • Redfly

  • Insidious Taurus

  • Dev-0391

  • Storm-0391

  • UNC3236

  • VOLTZITE

Over time, Volt Typhoon has demonstrated an ability to adapt and evolve its tactics. While initially observed exploiting known vulnerabilities in internet-facing devices, the group has also been linked to the potential use of zero-day exploits. Furthermore, Volt Typhoon has shown a remarkable ability to rebuild infrastructure after disruptions, such as the FBI-led takedown of the KV-botnet, a network of compromised SOHO routers used by the group. This resilience and adaptability highlight the group's commitment to its objectives and the resources available to it.

Tactics & Techniques

Volt Typhoon's operations are characterized by a strong emphasis on stealth and operational security, making them particularly difficult to detect. Their hallmark tactic is "living off the land" (LOTL), which involves using legitimate system administration tools and processes already present in the target environment. This approach allows them to blend in with normal network activity and avoid triggering alerts from traditional security solutions.

Key stages of a Volt Typhoon attack include:

  • Initial Access: The group typically gains initial access by exploiting known or zero-day vulnerabilities in public-facing network appliances, such as routers, VPNs, and firewalls from vendors like Fortinet, Ivanti, NETGEAR, Citrix, and Cisco. They also leverage publicly available exploit code.

  • Reconnaissance: Before and after compromising a network, Volt Typhoon conducts extensive reconnaissance. They use open-source intelligence (OSINT) tools and search engines like FOFA, Shodan, and Censys to gather information about the target organization, its network infrastructure, key personnel, and security measures. Amass is an open-source reconnaissance tool helpful for network mapping.

  • Resource Development: They often use multi-hop proxies, including compromised SOHO routers, to obfuscate their activity and make attribution more difficult. The KV-botnet is a prime example of this tactic.

  • Persistence: Volt Typhoon establishes persistent access using valid accounts, often compromised through credential theft or exploitation of privilege escalation vulnerabilities. They may also establish VPN sessions or use custom backdoors (rarely). A privilege escalation attack can be devastating.

  • Defense Evasion: In addition to LOTL techniques, Volt Typhoon employs other defense evasion methods, such as selectively clearing logs to remove traces of their activity. They have also been seen using UPX packing for obfuscation.

  • Credential Access: A crucial objective is to obtain administrator credentials. They achieve this through various methods, including exploiting privilege escalation vulnerabilities, obtaining credentials stored on compromised appliances, and extracting the Active Directory database (NTDS.dit) from domain controllers. Offline password cracking of the NTDS.dit data allows them to gain elevated access.

  • Discovery: Within the compromised network, Volt Typhoon uses a combination of commercial tools, LOTL utilities, and existing appliances to gather information about the system, network services, user accounts, and group memberships. PowerShell is frequently used for targeted queries on Windows event logs.

  • Lateral Movement: The group primarily uses Remote Desktop Protocol (RDP) with compromised credentials to move laterally within the network.

  • Collection: Volt Typhoon collects sensitive information, with a particular focus on data related to Operational Technology (OT) equipment, SCADA systems, relays, and switchgear. This indicates a potential intent to disrupt physical processes.

  • Command and Control (C2): They leverage compromised SOHO routers and Virtual Private Servers (VPS) for command and control. They have also been observed setting up FRP (Fast Reverse Proxy) clients on victim infrastructure to maintain access. They often utilize a VPN for this purpose, but it's important to avoid free VPNs.

Targets or Victimology

Volt Typhoon's targeting pattern is highly specific and strategically significant. Their primary focus is on US critical infrastructure organizations, including:

  • Communications: Telecommunications providers, internet service providers.

  • Energy: Power generation, transmission, and distribution companies.

  • Transportation Systems: Railways, ports, airports, and other transportation networks.

  • Water and Wastewater Systems: Water treatment plants, distribution networks.

  • Manufacturing

  • Construction

  • Maritime

  • Government

  • Information Technology

  • Education Sector

The targeting of these sectors suggests a clear intent to pre-position for potential disruptive attacks that could have significant consequences for national security, economic stability, and public safety. Smaller organizations that provide services to larger critical infrastructure entities are also at risk, as Volt Typhoon may use them as stepping stones to reach their ultimate targets. Geographically, compromises have been confirmed in the continental and non-continental United States and its territories, including Guam. The involvement of Five Eyes partners in joint advisories suggests that other countries, including Australia, Canada, New Zealand, and the United Kingdom, may also be vulnerable. Security logging is also an important aspect to consider.

Attack Campaigns

Several notable attack campaigns have been attributed to Volt Typhoon:

  • US Critical Infrastructure and Military Targeting (2021-Present): Ongoing activity aimed at gathering information on US critical infrastructure and military capabilities. This includes targeting organizations in Guam, a strategically important location in the Pacific. This campaign highlights Volt Typhoon's focus on reconnaissance and potential preparation for future disruptive attacks.

  • Exploitation of Network Appliances: Volt Typhoon has consistently exploited vulnerabilities in network appliances from various vendors, including Fortinet, Ivanti, NETGEAR, Citrix, and Cisco. This demonstrates their ability to leverage both known and potentially zero-day vulnerabilities to gain initial access.

  • KV-Botnet Utilization and Disruption: The group utilized the KV-botnet, a network of compromised SOHO routers, to mask their activities. A court-authorized operation by the FBI successfully disrupted this botnet, but Volt Typhoon has demonstrated the capability to rebuild its infrastructure. Understanding Indicator of Compromise (IOC) is crucial.

Defenses

Defending against Volt Typhoon requires a multi-layered approach that combines proactive prevention, robust detection capabilities, and a well-defined incident response plan. Due to the group's reliance on "living off the land" techniques and valid accounts, traditional signature-based security solutions are often ineffective.

Key defense strategies include:

  • Harden the Attack Surface:

* Regularly patch and update all internet-facing systems, especially network appliances.

* Apply hardening guidance provided by vendors and security organizations.

* Maintain a comprehensive asset inventory to identify and manage all devices connected to the network.

* Limit internet exposure of management interfaces and other critical services.

* Develop a plan for managing and replacing end-of-life technology.

  • Secure Credentials and Accounts:

* Enforce strong password policies and prohibit the use of default passwords.

* Do not store credentials on edge devices or in plaintext.

* Implement multi-factor authentication (MFA) for all users and privileged accounts, preferably using phishing-resistant MFA methods.

* Separate user accounts from privileged accounts and enforce the principle of least privilege.

* Limit the number of users with elevated privileges and implement continuous monitoring of privileged account activity.

* Transition to Group Managed Service Accounts (gMSAs) where possible.

* Consider implementing Privileged Access Management (PAM) solutions.

* Implement an Active Directory tiering model to restrict access to sensitive resources.

* Harden administrative workstations and disable accounts of departing employees.

* Regularly audit user accounts and permissions.

* Improve the management of hybrid identity federation.

  • Secure Remote Access Services:

* Limit the use of RDP and other remote access services whenever possible.

* Disable SMBv1 and harden SMBv3.

* Apply mitigations and best practices outlined in CISA's guide on securing remote access software.

  • Implement Network Segmentation:

* Isolate sensitive accounts and systems from the rest of the network.

* Conduct trust assessments to identify and mitigate potential risks.

* Harden federated authentication and implement network segmentation to isolate federation servers.

  • Secure Cloud Assets:

* Harden cloud assets

* Revoke unnecessary public access

* Disable legacy authentication protocols

* regularly monitor and audit privileged cloud-based accounts.

  • Enhance Detection Capabilities:

* Enable comprehensive logging, including PowerShell logging, and store logs centrally for analysis.

* Establish baselines of normal network activity and user behavior to identify anomalies.

* Implement behavioral monitoring to detect activities that rely on legitimate tools and processes.

* Utilize Endpoint Detection and Response (EDR) solutions in block mode.

* Actively hunt for signs of compromise using threat intelligence, hunting queries, and IOCs.

  • OT-Specific Mitigations:

* Change default passwords on all OT devices.

* Enforce strict access policies for OT networks.

* Segment OT networks from IT networks.

* Monitor connections to and from OT networks for unauthorized activity.

* Monitor for unauthorized controller changes.

* Lock or limit set points to prevent unauthorized manipulation.

* Develop and implement a plan for maintaining resilience in the event of a cyberattack.

  • Be Prepared:

* Enable logging

* Store logs centrally

* Establish a baseline of normal activity

* Document threats and TTPs

* Implement training

  • Incident Response:

* Assume full domain compromise if NTDS.dit extraction is detected.

* Sever the network from the internet (or shutdown non-essential traffic).

* Reset credentials.

* Audit network appliance configurations.

* Update firmware and software.

* Report the compromise.

* Apply best practices for identity and credential access management in cloud/hybrid environments. In case of a cyber incident, having a Cyber Incident Response Plan (CIRP) is crucial. Security teams can also identify suspicious events with User and Event Behavioral Analytics (UEBA). SOAR vs SIEM vs XDR, understanding key differences are also important in incident response.

Conclusion

Volt Typhoon represents a significant and persistent threat to US critical infrastructure. The group's state-sponsored backing, strategic objectives, sophisticated techniques, and focus on stealth make them a formidable adversary. Defending against Volt Typhoon requires a proactive, multi-layered approach that goes beyond traditional security measures. Organizations must prioritize hardening their attack surface, securing credentials and accounts, implementing robust detection capabilities, and developing comprehensive incident response plans. Collaboration and information sharing between government agencies, international partners, and the private sector are crucial to effectively counter this evolving threat and protect critical infrastructure from potential disruption. Patch Management is also important for the security measures.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe