In the ever-evolving landscape of cybersecurity in 2023, the activities of state-sponsored Advanced Persistent Threat (APT) groups have become a significant area of focus. Among these, the Chinese APT group known as Volt Typhoon (alias: VANGUARD PANDA) has been identified as a key player. This group has been systematically linked to a series of cyber-attacks, specifically targeting critical infrastructure in the United States and other Western nations.

In the wake of escalating geopolitical tensions, the activities of Volt Typhoon have taken on a new urgency. The group’s focus on critical infrastructure – from power grids to water treatment facilities – has raised the stakes in the global cybersecurity arena. The potential for significant disruption and damage is real, and the need for robust cyber defenses has never been more critical.

This blog post aims to shed light on the tactics, techniques, and procedures (TTPs) employed by Volt Typhoon, as well as the Indicators of Compromise (IOCs) associated with their cyber-attacks. We will also explore the broader context of cyber warfare, drawing on recent events in Russia and Ukraine to highlight potential future threats.

By understanding the strategies of groups like Volt Typhoon, we can better prepare and protect our critical infrastructure against these evolving threats. So, let’s delve into the world of Volt Typhoon and uncover the secrets of this formidable Chinese APT group.

The Volt Typhoon APT

The Volt Typhoon APT is a state-sponsored group, believed to be operating out of China. The group has been active since mid-2021 and has been targeting critical infrastructure sectors in the US, including IT, Energy, Healthcare and Public Health, Communications, and Critical Manufacturing.

The group’s modus operandi involves using ‘Living off the Land’ techniques, which involve the use of legitimate tools and processes already present in the target environment to maintain anonymity and evade detection. This approach makes it challenging to detect and mitigate the threat posed by the group.

Indicators of Compromise (IOCs)

Several IOCs have been associated with the Volt Typhoon APT. These include the use of PowerShell scripts, scheduled tasks, and WMI for persistence, along with the abuse of cloud storage services for data exfiltration. The group has also been known to use a variety of malware, including custom backdoors and publicly available tools.

The group has been observed using compromised Small-Office Home-Office (SOHO) devices (e.g. routers) to obfuscate the source of the activity. Most common types include ASUS, Cisco RV, Draytek Vigor, FatPipe IPVPN/MPVPN/WARP, Fortinet Fortigate, Netgear Prosafe, and Zyxel USG devices. The group has also been observed exploiting vulnerabilities in widely used software including, but not limited to:

  • CVE-2021-40539—ManageEngine ADSelfService Plus. CISA Advisory
  • CVE-2021-27860—FatPipe WARP, IPVPN, MPVPN. IC3 Advisory

Indicators of Compromise (IOCs):

  1. SHA256 Hash: f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
    • Description: EarthWorm EK variant
    • Filename: N/A
    • Purpose: Used for initial access and lateral movement
  2. SHA256 Hash: ef09b8ff86c276e9b475a6ae6b54f08ed77e09e169f7fc0872eb1d427ee27d31
    • Description: Customized version of Impacket’s Wmiexec
    • Filename: N/A
    • Purpose: Used for lateral movement and execution of commands
  3. SHA256 Hash: d6ebde42457fe4b2a927ce53fc36f465f0000da931cfab9b79a36083e914ceca
    • Description: Customized version of Fast Reverse Proxy (frp)
    • Filename: N/A
    • Purpose: Used for command and control communication

Tactics, Techniques, and Procedures (TTPs):

  1. T1560.001 – Archive Collected Data: Archive via Custom Method
  2. T1071.001 – Application Layer Protocol: Web Protocols
  3. T1573.002 – Encrypted Channel: Asymmetric Cryptography
  4. T1027 – Obfuscated Files or Information
  5. T1055.012 – Process Injection: Process Hollowing
  6. T1059.003 – Command and Scripting Interpreter: Windows Command Shell
  7. T1059.001 – Command and Scripting Interpreter: PowerShell
  8. T1569.002 – System Services: Service Execution
  9. T1105 – Ingress Tool Transfer
  10. T1071.001 – Application Layer Protocol: Web Protocols
  11. T1573.002 – Encrypted Channel: Asymmetric Cryptography

Commonly exploited CVEs by this threat actor:

  1. Apache Log4j (CVE-2021-44228) (NVD): This is a critical remote code execution vulnerability.
  2. Pulse Connect Secure (CVE-2019-11510) (NVD): This is a critical arbitrary file read vulnerability.
  3. GitLab CE/EE (CVE-2021-22205) (NVD): This is a critical remote code execution vulnerability.
  4. Atlassian Confluence Server and Data Center (CVE-2022-26134) (NVD): This is a critical remote code execution vulnerability.
  5. Microsoft Exchange (CVE-2021-26855) (NVD): This is a critical remote code execution vulnerability.
  6. F5 BIG-IP (CVE-2020-5902) (NVD): This is a critical remote code execution vulnerability.
  7. VMware vCenter Server (CVE-2021-22005) (NVD): This is a critical arbitrary file upload vulnerability.
  8. Citrix ADC (CVE-2019-19781) (NVD): This is a critical path traversal vulnerability.
  9. Cisco Hyperflex (CVE-2021-1497) (NVD): This is a critical command line execution vulnerability.
  10. Buffalo WSR (CVE-2021-20090) (NVD): This is a critical relative path traversal vulnerability.
  11. Atlassian Confluence Server and Data Center (CVE-2021-26084) (NVD): This is a critical remote code execution vulnerability.
  12. Hikvision Web Server (CVE-2021-36260) (NVD): This is a critical command injection vulnerability.
  13. Sitecore XP (CVE-2021-42237) (NVD): This is a critical remote code execution vulnerability.
  14. F5 BIG-IP (CVE-2022-1388) (NVD): This is a critical remote code execution vulnerability.
  15. Apache (CVE-2022-24112) (NVD): This is a critical authentication bypass vulnerability.
  16. ZOHO (CVE-2021-40539) (NVD): This is a critical remote code execution vulnerability.
  17. Microsoft (CVE-2021-26857) (NVD): This is a high severity remote code execution vulnerability.
  18. Microsoft (CVE-2021-26858) (NVD): This is a high severity remote code execution vulnerability.
  19. Microsoft (CVE-2021-27065) (NVD): This is a high severity remote code execution vulnerability.
  20. Apache HTTP Server (CVE-2021-41773) (NVD): This is a high severity path traversal vulnerability.

Please note that these

Threat Actors in China

China has a complex cyber threat landscape with several state-sponsored groups operating within its borders. Besides Volt Typhoon, other notable groups include APT10, APT19, and APT41. These groups have been involved in a wide range of activities, from cyber espionage to data theft and infrastructure disruption.

Previous Infrastructure Attacks

China has a history of launching cyber-attacks that could disrupt critical infrastructure services within the United States. Notable incidents include the Chinese Gas Pipeline Intrusion Campaign from 2011 to 2013, targeting U.S. oil and natural gas pipeline companies, and the recent attacks on global Managed Service Providers (MSPs) referred to as the CLOUD HOPPER campaign.

Lessons from recent conflicts

The ongoing conflict between Russia and Ukraine provides valuable insights into the potential escalation of cyber warfare. The war in Ukraine is the largest military conflict of the cyber age and the first to incorporate significant levels of cyber operations on all sides. Despite Russia’s cyber capabilities, it has fared poorly against Ukraine, indicating that even less cyber-capable nations can effectively defend against and retaliate to cyber-attacks.

Further Reading

In conclusion, the activities of the Volt Typhoon APT highlight the increasing threat posed by state-sponsored cyber actors to critical infrastructure. It is crucial for organisations to remain vigilant, understand the TTPs of these threat actors, and implement robust security measures to protect their assets.