Volt Typhoon

Threat Actor updated 6 days ago (2024-09-01T14:17:44.519Z)
Download STIX
Preview STIX
Volt Typhoon, a China-sponsored threat actor group identified as one of the most dangerous and persistent nation-state actors by security researchers and the U.S. government, has been active since at least mid-2021, carrying out cyber operations against critical infrastructure. The group is known for its strong operational security and obfuscation of their malware, employing advanced techniques for enterprise reconnaissance and lateral movement. Volt Typhoon's activities suggest that they primarily aim to establish a foothold within networks to secure access to Operational Technology (OT) assets, often obtaining information such as the victim's system timezone. In August 2024, new zero-day attacks were linked to Volt Typhoon, exploiting a vulnerability in Versa Director tracked as CVE-2024-39717. This enabled them to deploy a custom webshell, dubbed "VersaMem," on breached networks, capturing plaintext user credentials on affected systems. The group used this flaw to infiltrate target networks, with Black Lotus Labs attributing the zero-day exploit campaign to Volt Typhoon "with moderate confidence." The exploitation of this vulnerability was assessed as being limited to Volt Typhoon and likely ongoing against unpatched Versa Director systems. Despite efforts from entities like the FBI to disrupt Volt Typhoon's attack infrastructure, the threat posed by this group remains significant. As of the time of writing, the attacks are likely still ongoing, particularly against unpatched Versa Director systems. Given the group's demonstrated capabilities and persistence, it's crucial for organizations to prioritize patching vulnerabilities, enhancing their cybersecurity posture, and monitoring for signs of compromise related to Volt Typhoon's known tactics, techniques, and procedures.
Description last updated: 2024-09-01T14:16:24.462Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
BRONZE SILHOUETTE
6
Bronze Silhouette, also known as Volt Typhoon, Vanguard Panda, and Insidious Taurus, is a Chinese state-sponsored cyberespionage group that has been targeting U.S. government and defense organizations. The threat actor has been active since at least 2021, but it was only in May 2023 when the Nationa
Insidious Taurus
4
Insidious Taurus is a potent malware linked to the cyberespionage group Volt Typhoon, also known as Vanguard Panda, Bronze Silhouette, Dev-0391, UNC3236, and Voltzite. This group, believed to be state-sponsored by the People's Republic of China (PRC), has been implicated in numerous cyberattacks aga
Vanguard Panda
3
Vanguard Panda, also known as Volt Typhoon, Bronze Silhouette, Insidious Taurus, and APT41, is a cyberespionage group linked to the Chinese government. Since mid-2021, this threat actor has targeted critical infrastructure sectors including manufacturing, utility, maritime, and government entities i
Voltzite
3
Voltzite, also known as Volt Typhoon, Bronze Silhouette, Vanguard Panda, and UNC3236, is a threat actor that has been linked to the People's Republic of China. The group targets operational technology (OT) networks across multiple critical infrastructure sectors, including electric power generation,
Sandworm
2
Sandworm, a Russia-linked threat actor group, has been implicated in a series of significant cyber-attacks targeting Ukraine's infrastructure. The group successfully compromised 11 Ukrainian telecommunication providers, demonstrating their extensive capabilities and the broad reach of their operatio
APT41
2
APT41, a threat actor attributed to China, has been actively targeting organizations in at least 14 countries since 2012. The group is known for its use of an extensive range of malware, with at least 46 different code families and tools observed in their operations. They are associated with various
Hive
2
Hive is a malicious software (malware) that has been used by the cybercriminal group, Hunters International, to launch ransomware attacks since October of last year. The group operates as a ransomware-as-a-service (RaaS) provider, spreading Hive rapidly through collaborations with less sophisticated
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Botnet
State Sponso...
Apt
Proxy
Exploit
LOTL
Zero Day
Reconnaissance
Fortiguard
Microsoft
Fortinet
CISA
Vulnerability
Ransomware
Vpn
Webshell
Fbi
Espionage
Exploits
Known Exploi...
Lateral Move...
Fortigate
Windows
Versa
Chinese
China
Payload
Source
Tool
Ics
Mandiant
Command and ...
Credentials
Ivanti
Fortios
Chromium
Cybercrime
Rootkit
exploited
Chrome
Web Shell
Uk
Infiltration
Manageengine
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
BlackTechUnspecified
2
BlackTech, a China-linked Advanced Persistent Threat (APT) group, poses a significant cybersecurity threat due to its sophisticated and covert hacking activities. As a threat actor, BlackTech's operations involve executing actions with malicious intent, which can be attributed to individuals, privat
Unc3236Unspecified
2
None
APT29Unspecified
2
APT29, also known as Cozy Bear, Nobelium, The Dukes, Midnight Blizzard, BlueBravo, and the SVR group, is a Russia-linked threat actor notorious for its malicious cyber activities. In November 2023, this entity exploited a zero-day vulnerability in WinRAR software to launch attacks against various em
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
CVE-2023-27997Unspecified
3
CVE-2023-27997 is a critical vulnerability, designated as a heap-based buffer overflow issue, impacting Fortinet's FortiOS and FortiProxy SSL-VPN products. The flaw, with a high CVSS score of 9.2, could potentially lead to remote code execution (RCE), allowing an attacker to execute arbitrary code o
CVE-2022-40684Unspecified
2
CVE-2022-40684 is a significant software vulnerability identified in Fortinet devices, specifically relating to an authentication bypass flaw. This flaw in the software design or implementation allows threat actors to exploit the vulnerability, compromising network security and providing unauthorize
CVE-2024-39717Unspecified
2
None
Source Document References
Information about the Volt Typhoon Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
a day ago
Transparency, Sharing Help Defend Critical Infrastructure
Fortinet
2 days ago
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401 | FortiGuard Labs
Securityaffairs
6 days ago
Security Affairs newsletter Round 487 by Pierluigi Paganini – INTERNATIONAL EDITION
BankInfoSecurity
10 days ago
Chinese Nation-State Attackers Tied to Versa Zero-Day Hit
Securityaffairs
11 days ago
China-linked APT Volt Typhoon exploited a zero-day in Versa Director
DARKReading
11 days ago
China's Volt Typhoon Exploits 0-day in Versa's SD-WAN Director Servers
Krebs on Security
11 days ago
New 0-Day Attacks Linked to China’s ‘Volt Typhoon’
InfoSecurity-magazine
12 days ago
NSA Releases Guide to Combat Living Off the Land Attacks
DARKReading
15 days ago
Pluralsight Releases Courses to Help Cyber Pros Defend Against Volt Typhoon Hacker Group
CISA
17 days ago
Best Practices for Event Logging and Threat Detection | CISA
InfoSecurity-magazine
22 days ago
US Bipartisan Committee Urges Investigation Into Chinese Wi-Fi Routers
Securityaffairs
a month ago
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 6
InfoSecurity-magazine
a month ago
CrowdStrike Outage Serves as Dress Rehearsal for Chinese Cyber-Attacks
Securityaffairs
a month ago
security-affairs-malware-newsletter-round-5
InfoSecurity-magazine
a month ago
EPA Told to Address Cyber Risks to Water Systems
CERT-EU
7 months ago
China’s Cybersecurity and Statecraft
CERT-EU
7 months ago
Biden to sign executive order boosting cybersecurity of ports, maritime vessels
CERT-EU
6 months ago
2nd Annual Symposium Targets Cybercrime | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware
BankInfoSecurity
6 months ago
Embedded PLC Web Servers a Vector to New Class of OT Malware
CERT-EU
6 months ago
‘Societal chaos’: US cyber chief sounds alarm on China threat