https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Shutterstock/tuaindeed

Volt Typhoon

Microsoft: Volt Typhoon Targeting U.S. Critical Infrastructure Organizations

  • Written by Edward Gately
  • May 25, 2023
Delinea's Joseph Carson said the campaign is 'alarming'.

Microsoft has discovered malicious activity by Volt Typhoon, a state-sponsored threat actor based in China, aimed at U.S. critical infrastructure organizations.

The campaign is focused on post-compromise credential access and network system discovery. Volt Typhoon typically focuses on espionage and information gathering.

Volt Typhoon is pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises, according to Microsoft.

The threat actor has been active since mid-2021 and has targeted critical infrastructure organizations in Guam and elsewhere in the United States. In this campaign, the affected organizations span the communications, manufacturing, utility, transportation, construction, maritime, government, IT and education sectors.

Observed behavior suggests the threat actor intends to perform espionage and maintain access without being detected for as long as possible.

How Volt Typhoon Gains Initial Access

“To achieve their objective, the threat actor puts strong emphasis on stealth in this campaign, relying almost exclusively on living-off-the-land techniques and hands-on-keyboard activity,” Microsoft said in a blog. “Volt Typhoon achieves initial access to targeted organizations through internet-facing Fortinet FortiGuard devices. Microsoft continues to investigate Volt Typhoon’s methods for gaining access to these devices. The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials.”

Once Volt Typhoon gains access to a target environment, they begin conducting hands-on-keyboard activity via the command line. Some of these commands appear to be exploratory or experimental, as the operators adjust and repeat them multiple times.

Volt Typhoon rarely uses malware in their post-compromise activity. Instead, they rely on living-off-the-land commands to find information on the system, discover additional devices on the network and exfiltrate data.

“As with any observed nation-state actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments,” Microsoft said.

Actions by Volt Typhoon Could be Construed as ‘Act of War’

Volt typhoon

Bugcrowd’s Casey Ellis

Casey Ellis, Bugcrowd‘s founder and CTO, said the types of direct action Volt Typhoon could take depend on their level of access, and the vulnerabilities and design weakness that exist within the organizations they’ve compromised.

“There are plenty of examples of threat actors manipulating the power grid, for example,” he said. “But this would require that to be possible for that particular grid in the first place. It’s also worth noting that tampering or destroying critical infrastructure by a known state-sponsored threat actor could very easily be construed as an act of war, opening the possibility for escalation, which will hopefully act as a deterrent to these kinds of actions.”

Organizations can protect themselves by understanding their network environment, ensuring vulnerabilities are being identified and managed properly, and proactive threat hunting, Ellis said.

Volt typhoonAndrew Barratt, Coalfire‘s vice president, said this is a significant threat for a number of reasons, not the least of which is gaining access via compromising security devices such as firewalls.

“Then by using tools present in the environment, they are aiming to remain persistent and evasive,” he said. “This is less observed in criminal actors and more like classic espionage or nation-state activity. The compromise of security devices will for certain lead to follow-on criminal activity as copy cats will leverage the vulnerabilities against mid-size firms who have perhaps a hard-shell security model, but are a little weaker internally and exposed to more persistent intruders. Quick payouts are almost certainly going to come from ransomware in these scenarios.”

Big Questions Around Volt Typhoon’s Intentions, Motives

Volt typhoon

Delinea’s Joseph Carson

Joseph Carson, Delinea‘s chief security scientist and advisory CISO, said critical national infrastructure(CIN) is the “backbone to our digital societies and keeps our world in motion, so when nation-state actors target critical infrastructure it is a move that increases fear.”

“The big question is always about what are the intentions and motives, whether to identify potential targets for cyberattacks, steal intellectual property, or simply to cause disruption and interference,” he said. “Cyberattacks and abuse of unauthorized access is always a major topic. However, when it targets critical infrastructure, this should be a top priority to defend and warn off any attackers.”

This Volt Typhoon campaign is “alarming,” Carson said.

“The attackers are exploiting vulnerabilities, performing hands-on keyboard access to enumerate the victim’s networks, stealing credentials and elevating privileged access,” he said. “These recent events increase the importance on protecting remote access, credentials security and protecting privileged access with stronger security controls, auditability and implementing the principle of least privileged, which is an important methodology that supports a zero-trust architecture. It also shows that enforcing just-in-time and just-enough privilege policies should become the norm as they reduce the risk related to standing privileges and align with zero trust best practices.”

Long-Term Espionage Campaigns

Volt typhoon

Ontinue’s Craig Jones

Craig Jones, Ontinue‘s vice president of security operations, said Chinese-backed advanced persistent threat (APT) groups exhibit a high level of sophistication, capabilities and resources.

“These groups specialize in conducting targeted, long-term cyber espionage campaigns,” he said. “What distinguishes China-backed APT groups is their ability to blend advanced technical skills with a deep understanding of their targets, enabling them to execute highly tailored and customized attacks. Their involvement in intellectual property theft and the exploitation of supply chain vulnerabilities further underscores their strategic approach. Moreover, China’s proficiency in utilizing zero-day exploits adds another layer of complexity to their cyber activities. As the cybersecurity landscape continues to evolve, addressing China’s utilization of zero-day attacks remains a crucial aspect of bolstering defenses and safeguarding against emerging threats.”

Want to contact the author directly about this story? Have ideas for a follow-up article? Email Edward Gately or connect with him on LinkedIn.
Tags: MSPs VARs/SIs Analytics Best Practices Channel Research Security Strategy

Most Recent


  • Making Waves
    7 Channel People Making Waves This Week at AWS, Cisco, Snyk, CrowdStrike, More
    Earlier this year, ServiceNow made a $25 million strategic investment in Snyk. This followed Snyk closing a $196.5 million funding round.
  • AppDirect-TBI, latest channel M&A
    Latest Channel M&A: ReliaQuest, IBM, Broadcom, Amplix, More
    Absolute Software, Procure IT and Qlik were among other companies wheeling and dealing in May.
  • CwCJ with Palo Alto Networks
    Coffee with Craig and James Episode 124: Palo Alto Networks
    Cybersecurity is on the agenda, as we talk threats, channel program and more.
  • CP Expo Best in Show 2023
    Images: Channel Partners Conference & Expo Best in Show Awards
    Vonage, T-Mobile, OpenText and 8x8 were among the winners. See who else took home honors.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Cyber Insurance coverage
    Kaseya Launches Cybersecurity Insurance Coverage Program
  • td synnex ciso
    The Gately Report: TD Synnex CISO on Protecting the World's Largest Distributor
  • ransomware attacks
    Survey: Backups Are Prime Targets for Ransomware Attacks, Most Remain Exposed
  • call for speakers
    Channel Futures Leadership Summit Call for Speakers Open

Upcoming Events

View all

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Channel Partners Conference & Expo

March 11, 2024 - March 14, 2024

Galleries

View all

7 Channel People Making Waves This Week at AWS, Cisco, Snyk, CrowdStrike, More

June 9, 2023

Latest Channel M&A: ReliaQuest, IBM, Broadcom, Amplix, More

June 9, 2023

Images: Channel Partners Conference & Expo Best in Show Awards

June 9, 2023

Industry Perspectives

View all

Identity Is Increasingly Valuable – and Targeted

May 18, 2023

Gaining a Competitive Advantage through AV Managed Services

May 10, 2023

How to Build an Organization That Attracts and Retains Talent

May 1, 2023

Webinars

View all

From Problem to Profit: Mastering the Science of Selling Using Business Outcomes

May 9, 2023

Meet the 2023 Channel Futures Channel Influencers

April 13, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Coffee with Craig and James Episode 124: Palo Alto Networks

Motus: Partners Grasping Mobile Workforce Management Opportunity

June 9, 2023

Coffee with Craig and James Episode No. 123: MartinWolf M&A Advisors, CP Expo Preview

April 24, 2023

UScellular Takes On Rivals with Partner Program Simplicity

April 21, 2023

Twitter

ChannelFutures

Channel people making waves include @mnair1, @George_Kurtz, @mike_at_vulcan, @jzoblin, @jpatel41 and more.… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

.@motusdotcom wraps its #CPExpo experience, talks mobile workforce management opportunity in the channel.… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

Find out why #companyculture is significant when planning a merger or #acquisition. dlvr.it/SqR4ks https://t.co/gAUxiEW4yE

June 9, 2023
ChannelFutures

Great conversation with @Tom_D_Evans of @PaloAltoNtwks talking #cybersecurity, channel, more.… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

The latest channel M&A includes @ReliaQuest, @IBM, @Broadcom, @AmpliXIT and more. dlvr.it/SqQntD https://t.co/DektC1Xmz9

June 9, 2023
ChannelFutures

Find out why everyone is talking about generative AI and cloud in this exciting new article >>… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

In just 4 days, #ChannelPartners will come together in #London for #ChannelEurope. Professionals from the IT & Tele… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

Kicking off a multi-part series, get the inside scoop on what changes are taking pace in the channel. In this galle… twitter.com/i/web/status/1…

June 8, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X