Author:
Kaustubh Jagtap, Product Marketing Director, SafeBreach
On February 7th, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) issued an urgent advisory to warn about the possibility of People’s Republic of China (PRC)-affiliated threat actors seeking to execute disruptive or destructive attacks by positioning themselves on IT networks belonging to critical infrastructure entities. Detailed information about these activities and the associated indicators of compromise (IOCs) along with the various tactics, techniques, and procedures (TTPs) is listed in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure.
This advisory is based on incident response activities conducted by CISA, NSA, FBI and their partners at critical infrastructure organizations compromised by the state-sponsored threat group Volt Typhoon (also known as Vanguard Panda, BRONZE SILHOUETTE, Dev-0391, UNC3236, Voltzite, and Insidious Taurus). The assessment has revealed that Volt Typhoon has successfully compromised IT networks in several critical infrastructure entities, primarily in the Communications, Energy, Transportation, and Water and Wastewater systems sectors across the continental and non-continental United States.
Based on the details available, Volt Typhoon’s assessed behavior indicates that their objectives were not focused on spying or gathering intelligence. Instead, the agencies believe that Volt Typhoon threat actors were essentially preparing to position themselves inside IT networks where they could inflict maximum damage on U.S. critical infrastructure in the event of hostilities between the PRC and the United States. The advisory has highlighted Volt Typhoon’s use of living off the land (LOTL) techniques when targeting critical infrastructure entities, allowing them to maintain persistence in IT networks without being detected. The agencies believe that in some cases, these threat actors had been maintaining access to IT networks for at least 5 years. Volt Typhoon actors are known to conduct extensive pre-exploitation reconnaissance to learn about their target organization and its environment. They leverage gathered information to customize their TTPs for each target and then continue maintaining their presence on victim networks to further understand their network behavior over time.
While TTPs may have been customized for each target, the agencies also noticed a similar pattern of behavior across all the identified intrusions. Volt Typhoon’s typical attack activity can be summarized below (also seen in the image).
Important Note for SafeBreach Customers – Coverage for AA24-038A (Volt Typhoon)
As soon as details were made available, the SafeBreach Labs teams mapped existing attacks and added new attacks to the Hacker’s Playbook immediately. It is important to note that existing SafeBreach customers were already protected against several of the IOC-based attacks identified in the advisory. Please run/ re-run the attacks listed below to ensure your environments are protected against this malware variant.
NEW IOC-Based Attacks Related to CERT Alert
Existing IOC-based Attacks Mapped to the CERT Alert
What You Should Do Now
The playbook has been updated with new attacks that map to the IOCs identified in this US-CERT Alert. SafeBreach customers can now validate their security controls against these TTPs and IOCs in multiple ways.
Method 1 – You can go to the “SafeBreach Scenarios” page and choose the AA24-038A (Volt Typhoon) scenario from the list of available scenarios.
Method 2 – From the Attack Playbook, select and filter attacks related to US-CERT Alert AA24-038A (Volt Typhoon). Additionally, you can refer to the list above as well to ensure a comprehensive level of coverage.
Method 3 – From the Known Attack Series report, select the AA24-038A (Volt Typhoon) report and select Run Simulations which will run all attack methods.
NOTE – FBI, NSA, and CISA recommend continually validating your security program, at scale, in a production environment to ensure optimal performance against the growing threat of advanced cyber threats. Additional recommendations include:
The post Volt Typhoon: SafeBreach Coverage for US-CERT Alert (AA24-038A) appeared first on SafeBreach.
*** This is a Security Bloggers Network syndicated blog from SafeBreach authored by Kaustubh Jagtap. Read the original post at: https://www.safebreach.com/blog/volt-typhoon-safebreach-coverage-for-us-cert-alert-aa24-038a/