Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Volt Typhoon: the emerging chinese cyber-espionage threat

Detailed analysis reveals advanced hacking techniques used by Volt Typhoon, a new chinese cyber-espionage group, also known as Vanguard Panda

This pill is also available in Italian language

A new Chinese state actor in the cyber warfare landscape, known as Volt Typhoon, has been recently discovered and has been active since 2020. This group of hackers has shown unprecedented operational techniques to maintain remote access to its targets. The findings come from CrowdStrike, which keeps the enemy under control by the name of Vanguard Panda. Volt Typhoon, also known as Bronze Silhouette, is a Chinese cyber-espionage group, involved in network intrusion operations against the US government, defense and other critical infrastructure organizations.

Volt Typhoon attack techniques: operational security and open-source tools

A detailed analysis of how the group operates revealed a strong emphasis on operational security, with the careful use of a large set of open-source tools against a small number of victims to perpetrate long-term malicious acts. Volt Typhoon has been described as a threat group that "favors web shells for persistence and relies on short periods of activity, primarily involving living-off-the-land binaries, to achieve its objectives."

Failed attack and the modus operandi of Vanguard Panda

In a failed incident targeting an unspecified customer, the actor targeted the Zoho ManageEngine ADSelfService Plus service running on an Apache Tomcat server to trigger the execution of suspicious commands regarding process enumeration and process connectivity. network, among others. CrowdStrike's analysis suggests that Vanguard Panda's actions denote a familiarity with the target environment, thanks to the rapid succession of their commands, as well as the availability of specific internal hostnames and IP addresses to ping, remote shares to mount, and credentials in clear to use for WMI.

Forensic discoveries and attempted concealment of the tracks

A closer examination of Tomcat's access logs revealed several HTTP POST requests to /html/promotion/selfsdp.jspx, a web shell masquerading as a legitimate identity security solution to evade detection. The web shell is believed to have been deployed nearly six months before the activity described, indicative of extensive preliminary reconnaissance work on the target network. While it is not immediately clear how Vanguard Panda managed to breach the ManageEngine environment, all signs point to the exploitation of CVE-2021-40539, a critical remote code execution authentication bypass flaw. Suspected of deleting artifacts and tampering with access logs to obscure the forensic path, the actor made an obvious mistake by not considering the Java source files and compiled class files generated during the attack.

Follow us on Facebook for more pills like this

06/26/2023 07:19

Marco Verro

Complementary pills

Cyber warfare: Volt Typhoon's blow to USA securityMicrosoft reports bold cyber attack from China: military powerhouse Guam in Pacific is targeted by cyber espionage operation

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated