The Volt Typhoon cyber attack is a sophisticated threat where adversaries exploit valid credentials to maintain stealthy access to IT and OT networks. One key tactic they employ is using Remote Desktop Protocol (RDP) sessions to move laterally within a compromised system. Detecting these malicious sessions requires careful analysis of both network and host logs.
This article, based on a Tech Talk Tuesday discussion by Dan Gunter from Insane Cyber, explores how threat hunters can identify malicious RDP activity using various logging techniques.
Volt Typhoon is a nation-state cyber attack campaign, reportedly associated with Chinese-affiliated actors. These adversaries pre-position themselves within networks for long-term espionage and potential future attacks.
Reports indicate that they have been inside certain networks for five or more years, using techniques such as:
A critical part of their attack strategy involves RDP sessions with stolen or default credentials, allowing them to move laterally while avoiding detection.
RDP is a legitimate Windows feature used for remote access. However, attackers exploit it using three types of accounts:
Since RDP sessions are encrypted, traditional monitoring methods may not immediately detect malicious use. This makes network and host log correlation essential for identifying unauthorized access.
Network logs provide critical insights into RDP sessions. The video outlines several ways to detect suspicious activity:
SSL Logs:
x509 Certificate Logs:
Connection Logs (con.log):
While network logs provide a broad view of RDP activity, host-level logs offer deeper insights into specific user actions.
By combining these insights, analysts can flag unusual RDP usage and respond quickly.
Preventing unauthorized RDP sessions requires a combination of monitoring, access control, and threat intelligence.
The Volt Typhoon attack demonstrates how stealthy adversaries can exploit RDP for lateral movement. Detecting these threats requires a multi-layered approach involving network logs, host logs, and behavioral analysis.
By understanding attack techniques and enhancing detection capabilities, organizations can proactively defend against cyber threats and prevent unauthorized access to critical systems.
Our products are designed to work with
you and keep your network protected.
Insane Cyber © All Rights Reserved 2025