Firewalls are often seen as the frontline defense against cyber threats, but what happens when they become the target? In a recent Tech Talk session, cybersecurity expert Dan Gunter discussed the alarming reality of firewall vulnerabilities, using the Volt Typhoon cyber intrusion report as a case study. This article explores how attackers exploit firewalls, why traditional defenses fall short, and what organizations can do to detect and prevent such threats.
Volt Typhoon is a Chinese-based cyber intrusion group that has been actively infiltrating both IT and industrial networks. Unlike many threat actors that deploy custom malware, Volt Typhoon operates by “living off the land,” using built-in features of Windows and other operating systems. This tactic allows them to blend seamlessly with normal network activity, making detection extremely difficult.
The group has been observed collecting valid user credentials for over five years, allowing them to bypass traditional security measures. Their approach is not about causing immediate damage but rather about establishing persistent access that can be leveraged in the future—potentially during geopolitical conflicts.
Firewalls are designed to protect networks from external threats, but ironically, they are often one of the most exposed systems in an organization. Attackers target them because:
A key example is CVE-2022-42475, a Fortinet SSL VPN vulnerability that was actively exploited. In some cases, organizations had failed to patch their systems, leaving them vulnerable for extended periods.
Volt Typhoon and other Advanced Persistent Threats (APTs) employ a variety of techniques to compromise firewalls:
These techniques enable adversaries to maintain long-term access while avoiding detection by traditional security tools.
Since attackers use stealthy techniques, organizations need to adopt proactive monitoring and defensive strategies to detect and prevent intrusions. Here are some recommended approaches:
Firewalls are essential to cybersecurity, but they are not invulnerable. The Volt Typhoon case highlights how determined attackers can exploit vulnerabilities in publicly facing applications to gain persistent access. To stay ahead of these threats, organizations must adopt a multi-layered defense strategy that includes network analytics, log inspection, behavior-based detection, and rigorous patching protocols.
Cybersecurity is not just about building barriers—it’s about constantly monitoring, adapting, and thinking like an attacker. Organizations that trust but verify their security measures will be far better equipped to withstand sophisticated threats like Volt Typhoon.
Our products are designed to work with
you and keep your network protected.
Insane Cyber © All Rights Reserved 2025