Volt Typhoon
About
They targets the critical infrastructure via the exploitation of the target's vulnerabilities and insert themselves into the victims' devices to take control of everything.
Targets
How does Volt Typhoon works?
After that, Volt Typhoon proxies all its network traffic to its targets through compromised SOHO network edge devices. Proxying of these devices allows them to enhance the stealth of their operations and lowers overhead costs for acquiring infrastructure.
Volt Typhoon rarely uses malware in their post-compromise activity. They generally rely on living-off-the-land commands to find information, discover additional devices on the network, and exfiltrate data.
Protection
- Owners of the network edge devices should ensure that management interfaces are not exposed to the public internet to reduce their attack surface.
- Enforce strong multi-factor authentication (MFA) policies with the help of hardware security keys or Microsoft Authenticator.
- Reduce the attack surface by turning on the attack surface reduction rules to block or audit some observed activity associated with this threat.
- Turn-on cloud-delivered protection in Microsoft Defender Antivirus to cover rapidly evolving attacker tools, techniques, and behaviors.
- Run Endpoint Detection and Response (EDR) in block mode. In this way, Microsoft Defender for Endpoint can block malicious artifacts that are detected post-compromise.
Comments
Post a Comment