Volt Typhoon is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021 primarily targeting critical infrastructure organizations in the US and its territories including Guam. Volt Typhoon's targeting and pattern of behavior have been assessed as pre-positioning to enable lateral movement to operational technology (OT) assets for potential destructive or disruptive attacks. Volt Typhoon has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.[1][2][3][4]
| Name | Description |
|---|---|
| BRONZE SILHOUETTE | |
| Vanguard Panda | |
| DEV-0391 | |
| UNC3236 | |
| Voltzite | |
| Insidious Taurus |
| ID | Name | First Seen | Last Seen | References | Techniques |
|---|---|---|---|---|---|
| C0035 | KV Botnet Activity | October 2022 [5] | January 2024 [6] |
Volt Typhoon used KV Botnet Activity to build intermediate communication chains between operators and victims, such as identified access to victims in Guam.[5] |
事件触发执行, 伪装: Masquerade Task or Service, 伪装, 加密通道, 命令与脚本解释器: Unix Shell, 基础设施妥协: Network Devices, 妨碍防御: Disable or Modify Tools, 文件和目录发现, 文件和目录权限修改: Linux and Mac File and Directory Permissions Modification, 移除指标: File Deletion, 系统信息发现, 系统网络配置发现, 获取基础设施: Virtual Private Server, 软件发现: Security Software Discovery, 输入工具传输, 进程发现, 进程注入: Proc Memory, 非应用层协议, 非标准端口 |
| C0039 | Versa Director Zero Day Exploitation | June 2024 [7] | August 2024 [7] |
Versa Director Zero Day Exploitation was conducted by Volt Typhoon between June and August 2024.[7] |
利用公开应用程序漏洞, 加密通道: Asymmetric Cryptography, 基础设施妥协: Network Devices, 应用层协议: Web Protocols, 开发能力: Malware, 服务器软件组件: Web Shell, 输入捕获, 非应用层协议 |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Volt Typhoon has leveraged WMIC for execution, remote system discovery, and to create and use temporary directories.[2][3][4][1] |
|
| Enterprise | T1546 | 事件触发执行 |
KV Botnet Activity involves managing events on victim systems via |
|
| Enterprise | T1555 | 从密码存储中获取凭证 |
Volt Typhoon has attempted to obtain credentials from OpenSSH, realvnc, and PuTTY.[3] |
|
| .003 | Credentials from Web Browsers |
Volt Typhoon has targeted network administrator browser data including browsing history and stored credentials.[1] |
||
| Enterprise | T1005 | 从本地系统获取数据 |
Volt Typhoon has stolen files from a sensitive file server and the Active Directory database from targeted environments, and used Wevtutil to extract event log information.[3][4][1] |
|
| Enterprise | T1090 | 代理 |
Volt Typhoon has used compromised devices and customized versions of open source tools such as FRP (Fast Reverse Proxy), Earthworm, and Impacket to proxy network traffic.[2][3][1] |
|
| .001 | Internal Proxy |
Volt Typhoon has used the built-in netsh |
||
| .003 | Multi-hop Proxy |
Volt Typhoon has used multi-hop proxies for command-and-control infrastructure.[1] |
||
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
KV Botnet Activity installation steps include first identifying, then stopping, any process containing |
| .005 | 伪装: Match Legitimate Name or Location |
Volt Typhoon has used legitimate looking filenames for compressed copies of the ntds.dit database and used names including cisco_up.exe, cl64.exe, vm3dservice.exe, watchdogd.exe, Win.exe, WmiPreSV.exe, and WmiPrvSE.exe for the Earthworm and Fast Reverse Proxy tools.[3][4][1] |
||
| .008 | 伪装: Masquerade File Type |
Volt Typhoon has appended copies of the ntds.dit database with a .gif file extension.[4] |
||
| Enterprise | T1112 | 修改注册表 |
Volt Typhoon has used |
|
| Enterprise | T1190 | 利用公开应用程序漏洞 |
Volt Typhoon has gained initial access through exploitation of multiple vulnerabilities in internet-facing software and appliances such as Fortinet, Ivanti (formerly Pulse Secure), NETGEAR, Citrix, and Cisco.[4][1] Versa Director Zero Day Exploitation involved exploitation of a vulnerability in Versa Director servers, since identified as CVE-2024-39717, for initial access and code execution.[7] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Volt Typhoon has used a version of the Awen web shell that employed AES encryption and decryption for C2 communications.[4] |
| .002 | 加密通道: Asymmetric Cryptography |
Versa Director Zero Day Exploitation used HTTPS for command and control of compromised Versa Director servers.[7] |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Volt Typhoon has used PowerShell including for remote system discovery.[2][3][1] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Volt Typhoon has used the Windows command line to perform hands-on-keyboard activities in targeted environments including for discovery.[2][3][4][1] |
||
| .004 | 命令与脚本解释器: Unix Shell |
Volt Typhoon has used Brightmetricagent.exe which contains a command- line interface (CLI) library that can leverage command shells including Z Shell (zsh).[1] KV Botnet Activity utilizes multiple Bash scripts during botnet installation stages, and the final botnet payload allows for running commands in the Bash shell.[5] |
||
| Enterprise | T1584 | .003 | 基础设施妥协: Virtual Private Server |
Volt Typhoon has compromised Virtual Private Servers (VPS) to proxy C2 traffic.[1] |
| .004 | 基础设施妥协: Server |
Volt Typhoon has used compromised Paessler Router Traffic Grapher (PRTG) servers from other organizations for C2.[4][1] |
||
| .005 | 基础设施妥协: Botnet |
Volt Typhoon Volt Typhoon has used compromised Cisco and NETGEAR end-of-life SOHO routers implanted with KV Botnet malware to support operations.[1] |
||
| .008 | 基础设施妥协: Network Devices |
Volt Typhoon has compromised small office and home office (SOHO) network edge devices, many of which were located in the same geographic area as the victim, to proxy network traffic.[2][3] Versa Director Zero Day Exploitation used compromised small office/home office (SOHO) devices to interact with vulnerable Versa Director servers.[7] KV Botnet Activity focuses on compromise of small office-home office (SOHO) network devices to build the subsequent botnet.[5] |
||
| Enterprise | T1120 | 外围设备发现 |
Volt Typhoon has obtained victim's screen dimension and display device information.[1] |
|
| Enterprise | T1133 | 外部远程服务 |
Volt Typhoon has used VPNs to connect to victim environments and enable post-exploitation actions.[1] |
|
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
KV Botnet Activity used various scripts to remove or disable security tools, such as |
| Enterprise | T1113 | 屏幕捕获 |
Volt Typhoon has obtained a screenshot of the victim's system using the gdi32.dll and gdiplus.dll libraries.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Versa Director Zero Day Exploitation established HTTPS communications from adversary-controlled SOHO devices over port 443 with compromised Versa Director servers.[7] |
| Enterprise | T1010 | 应用窗口发现 |
Volt Typhoon has collected window title information from compromised systems.[1] |
|
| Enterprise | T1587 | .001 | 开发能力: Malware |
Versa Director Zero Day Exploitation involved the development of a new web shell variant, VersaMem.[7] |
| .004 | 开发能力: Exploits |
Volt Typhoon has exploited zero-day vulnerabilities for initial access.[1] |
||
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Volt Typhoon has archived the ntds.dit database as a multi-volume password-protected archive with 7-Zip.[4][1] |
| Enterprise | T1594 | 搜索受害者拥有的网站 |
Volt Typhoon has conducted pre-compromise reconnaissance on victim-owned sites.[1] |
|
| Enterprise | T1596 | .005 | 搜索开放技术数据库: Scan Databases |
Volt Typhoon has used FOFA, Shodan, and Censys to search for exposed victim infrastructure.[1] |
| Enterprise | T1593 | 搜索开放网站/域 |
Volt Typhoon has conducted pre-compromise web searches for victim information.[1] |
|
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Volt Typhoon has attempted to access hashed credentials from the LSASS process memory space.[2][1] |
| .003 | 操作系统凭证转储: NTDS |
Volt Typhoon has used ntds.util to create domain controller installation media containing usernames and password hashes.[2][3][4][1] |
||
| Enterprise | T1592 | 收集受害者主机信息 |
Volt Typhoon has conducted pre-compromise reconnaissance for victim host information.[1] |
|
| Enterprise | T1591 | 收集受害者组织信息 |
Volt Typhoon has conducted extensive reconnaissance pre-compromise to gain information about the targeted organization.[1] |
|
| .004 | Identify Roles |
Volt Typhoon has identified key network and IT staff members pre-compromise at targeted organizations.[1] |
||
| Enterprise | T1590 | 收集受害者网络信息 |
Volt Typhoon has conducted extensive pre-compromise reconnaissance to learn about the target organization’s network.[1] |
|
| .004 | Network Topology |
Volt Typhoon has conducted extensive reconnaissance of victim networks including identifying network topologies.[1] |
||
| .006 | Network Security Appliances |
Volt Typhoon has identified target network security measures as part of pre-compromise reconnaissance.[1] |
||
| Enterprise | T1589 | 收集受害者身份信息 |
Volt Typhoon has gathered victim identify information during pre-compromise reconnaissance. [1] |
|
| .002 | Email Addresses |
Volt Typhoon has targeted the personal emails of key network and IT staff at victim organizations.[1] |
||
| Enterprise | T1074 | 数据分段 |
Volt Typhoon has staged collected data in password-protected archives.[2] |
|
| .001 | Local Data Staging |
Volt Typhoon has saved stolen files including the |
||
| Enterprise | T1083 | 文件和目录发现 |
Volt Typhoon has enumerated directories containing vulnerability testing and cyber related content and facilities data such as construction drawings.[1] KV Botnet Activity gathers a list of filenames from the following locations during execution of the final botnet stage: |
|
| Enterprise | T1222 | .002 | 文件和目录权限修改: Linux and Mac File and Directory Permissions Modification |
KV Botnet Activity altered permissions on downloaded tools and payloads to enable execution on victim machines.[5] |
| Enterprise | T1654 | 日志枚举 |
Volt Typhoon has used |
|
| Enterprise | T1078 | 有效账户 |
Volt Typhoon relies primarily on valid credentials for persistence.[1] |
|
| .002 | Domain Accounts |
Volt Typhoon has used compromised domain accounts to authenticate to devices on compromised networks.[2][4][1] |
||
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
Volt Typhoon has used webshells, including ones named AuditReport.jspx and iisstart.aspx, in compromised environments.[4] Versa Director Zero Day Exploitation resulted in the deployment of the VersaMem web shell for follow-on activity.[7] |
| Enterprise | T1552 | 未加密凭证 |
Volt Typhoon has obtained credentials insecurely stored on targeted network appliances.[1] |
|
| .004 | Private Keys |
Volt Typhoon has accessed a Local State file that contains the AES key used to encrypt passwords stored in the Chrome browser.[1] |
||
| Enterprise | T1068 | 权限提升漏洞利用 |
Volt Typhoon has gained initial access by exploiting privilege escalation vulnerabilities in the operating system or network services.[1] |
|
| Enterprise | T1069 | 权限组发现 |
Volt Typhoon has used commercial tools, LOTL utilities, and appliances already present on the system for group and user discovery.[1] |
|
| .001 | Local Groups |
Volt Typhoon has run |
||
| .002 | Domain Groups |
Volt Typhoon has run |
||
| Enterprise | T1012 | 查询注册表 |
Volt Typhoon has queried the Registry on compromised systems, |
|
| Enterprise | T1570 | 横向工具传输 |
Volt Typhoon has copied web shells between servers in targeted environments.[4] |
|
| Enterprise | T1217 | 浏览器信息发现 |
Volt Typhoon has targeted the browsing history of network administrators.[1] |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing |
Volt Typhoon has used the Ultimate Packer for Executables (UPX) to obfuscate the FRP client files BrightmetricAgent.exe and SMSvcService.ex) and the port scanning utility ScanLine.[1] |
| Enterprise | T1006 | 直接卷访问 |
Volt Typhoon has executed the Windows-native |
|
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
Volt Typhoon has selectively cleared Windows Event Logs, system logs, and other technical artifacts to remove evidence of intrusion activity.[1] |
| .004 | 移除指标: File Deletion |
Volt Typhoon has run [KV Botnet Activity](https://attack.mitre.org/campaigns/C0035) removes on-disk copies of tools and other artifacts after it the primary botnet payload has been loaded into memory on the victim device.[5] |
||
| .007 | 移除指标: Clear Network Connection History and Configurations |
Volt Typhoon has inspected server logs to remove their IPs.[4] |
||
| Enterprise | T1218 | 系统二进制代理执行 |
Volt Typhoon has used native tools and processes including living off the land binaries or "LOLBins" to maintain and expand access to the victim networks.[1] |
|
| Enterprise | T1614 | 系统位置发现 |
Volt Typhoon has obtained the victim's system current location.[1] |
|
| Enterprise | T1082 | 系统信息发现 |
Volt Typhoon has discovered file system types, drive names, size, and free space on compromised systems.[2][3][4][1] KV Botnet Activity includes use of native system tools, such as |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Volt Typhoon has used public tools and executed the PowerShell command |
|
| Enterprise | T1124 | 系统时间发现 |
Volt Typhoon has obtained the victim's system timezone.[1] |
|
| Enterprise | T1007 | 系统服务发现 |
Volt Typhoon has used |
|
| Enterprise | T1049 | 系统网络连接发现 |
Volt Typhoon has used |
|
| Enterprise | T1016 | 系统网络配置发现 |
Volt Typhoon has executed multiple commands to enumerate network topology and settings including KV Botnet Activity gathers victim IP information during initial installation stages.[5] |
|
| .001 | Internet Connection Discovery |
Volt Typhoon has employed Ping to check network connectivity.[1] |
||
| Enterprise | T1046 | 网络服务发现 |
Volt Typhoon has used commercial tools, LOTL utilities, and appliances already present on the system for network service discovery.[1] |
|
| Enterprise | T1583 | .003 | 获取基础设施: Virtual Private Server |
KV Botnet Activity used acquired Virtual Private Servers as control systems for devices infected with KV Botnet malware.[5] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
Volt Typhoon has used legitimate network and forensic tools and customized versions of open-source tools for C2.[2][1] |
| .006 | 获取能力: Vulnerabilities |
Volt Typhoon has used publicly available exploit code for initial access.[1] |
||
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
Volt Typhoon has run system checks to determine if they were operating in a virtualized environment.[2] |
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Volt Typhoon has executed |
| .002 | 账号发现: Domain Account |
Volt Typhoon has run |
||
| Enterprise | T1518 | 软件发现 |
Volt Typhoon has queried the Registry on compromised systems for information on installed software.[3][1] |
|
| .001 | Security Software Discovery |
KV Botnet Activity involved removal of security tools, as well as other identified IOT malware, from compromised devices.[5] |
||
| Enterprise | T1105 | 输入工具传输 |
Volt Typhoon has downloaded an outdated version of comsvcs.dll to a compromised domain controller in a non-standard folder.[1] KV Botnet Activity included the use of scripts to download additional payloads when compromising network nodes.[5] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
Volt Typhoon has created and accessed a file named rult3uil.log on compromised domain controllers to capture keypresses and command execution.[1] |
| Enterprise | T1057 | 进程发现 |
Volt Typhoon has enumerated running processes on targeted systems including through the use of Tasklist.[2][4][1] Scripts associated with KV Botnet Activity initial deployment can identify processes related to security tools and other botnet families for follow-on disabling during installation.[5] |
|
| Enterprise | T1055 | .009 | 进程注入: Proc Memory |
KV Botnet Activity final payload installation includes mounting and binding to the |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
Volt Typhoon has moved laterally to the Domain Controller via RDP using a compromised account with domain administrator privileges.[1] |
| Enterprise | T1018 | 远程系统发现 |
Volt Typhoon has used multiple methods, including Ping, to enumerate systems on compromised networks.[2][4] |
|
| Enterprise | T1095 | 非应用层协议 |
Versa Director Zero Day Exploitation used a non-standard TCP session to initialize communication prior to establishing HTTPS command and control.[7] KV Botnet Activity command and control traffic uses a non-standard, likely custom protocol for communication.[5] |
|
| Enterprise | T1571 | 非标准端口 |
KV Botnet Activity generates a random port number greater than 30,000 to serve as the listener for subsequent command and control activity.[5] |
|