Cyberattacks on critical infrastructure are becoming increasingly sophisticated, with state-sponsored actors employing stealthy and persistent techniques. One such attack, Volt Typhoon, targeted the U.S. and its allies, leveraging Living off the Land (LotL) techniques to evade detection. This article explores the attack, its methods, and the necessary defensive measures to counter such threats.
Volt Typhoon is a state-sponsored cyberattack attributed to China, first disclosed by Microsoft and CISA in May 2023. This espionage-driven attack focused on critical infrastructure sectors, including:
The attack was particularly concerning as it aimed for long-term access rather than immediate disruption, allowing the attackers to maintain persistence for future exploitation.
The attackers used a combination of LotL techniques, proxy tunneling, and credential dumping to achieve their objectives.
Volt Typhoon gained access through internet-facing management portals of small office/home office (SOHO) network devices, such as:
These devices often run outdated firmware, making them vulnerable to known security flaws (CVEs). While exact vulnerabilities weren’t disclosed, historical advisories indicate that similar attacks have exploited unpatched security flaws in network appliances.
Once inside, the attackers used Earthworm, a publicly available proxy tool, to establish a covert communication channel. This allowed them to:
Earthworm is not inherently malicious but is often used by advanced persistent threats (APTs) for stealthy data transfer.
One of the attack’s primary objectives was to extract login credentials using legitimate Windows tools.
The attackers executed base64-encoded PowerShell commands to:
Since rundll32.exe and comsvcs.dll are legitimate Windows processes, many security tools overlook this behavior.
Volt Typhoon also used WMIC (Windows Management Instrumentation Command-line tool) to execute:
The NTDS.dit file contains password hashes of all domain users, enabling attackers to:
Many critical event logs are not enabled by default. Security teams should activate and monitor:
Fun Fact: The attackers themselves used Windows Event Logs (Event ID 4624) to track legitimate administrator activity before escalating privileges!
Since Volt Typhoon relies on covert proxy tunnels, defenders should monitor for:
Using YARA rules, security teams can detect Earthworm activity or similar proxy tunneling behavior.
Defenders should proactively:
Volt Typhoon exemplifies the growing sophistication of cyber threats—leveraging legitimate system tools for stealth and persistence. Organizations must adopt a multi-layered defense strategy, combining log analysis, network monitoring, and proactive threat hunting to detect and mitigate such attacks.
By staying vigilant and monitoring for suspicious system activity, security teams can counteract Living off the Land threats and safeguard critical infrastructure from nation-state adversaries.
Our products are designed to work with
you and keep your network protected.
Insane Cyber © All Rights Reserved 2025