TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Calm In The Storm: Reviewing Volt Typhoon

2023-06-08 · Read original ↗

ATT&CK techniques detected

6 predictions
T1190Exploit Public-Facing Application
82%
"of external - facing services and network appliances since 2021. observed activity to date indicates this activity is likely limited to initial access development and information - gathering activity in victim environments. however, prominent us officials indicated in public comm…"
T1219Remote Access Tools
68%
"##promising various third - party entities to create a c2 layer that enables the “ core ” compromise activity against targeted networks. as shown at a high level in figure 1, such actions are complex endeavors but allow for an adversary to operate in a stealthy, difficult - to - …"
T1588.002Tool
54%
"mean to do them harm. as adversaries migrate from bespoke malware to leveraging common tools and administrative techniques for malicious purposes, the job of defenders will get more difficult — but with adequate visibility and understanding, it will not be impossible. defenders m…"
T1190Exploit Public-Facing Application
50%
"operations. although the threat might be different than that faced by critical infrastructure organizations, it remains very real and has implications for the victimized entity. simply dismissing campaigns such as volt typhoon as irrelevant thus sets an organization up for failur…"
T1090.002External Proxy
42%
", post - exploitation command and control ( c2 ) activity from volt typhoon uses proxied traffic through legitimate, compromised assets to obfuscate the intruder ’ s origins. specifically, volt typhoon appears to leverage vulnerabilities in a variety of small office, home office …"
T1078Valid Accounts
33%
"tools. in avoiding custom tools and malware, adversaries can both more effectively “ blend in ” with legitimate network administrator activity and avoid easy classification and identification by analysts and defenders. the lack of compiled tools or similar malware objects largely…"

Summary

Explore the recent disclosures concerning Volt Typhoon, a threat actor engaged in the widespread exploitation of external-facing services and network appliances.