Article Details

Scrape Timestamp (UTC): 2024-02-07 19:16:42.959

Source: https://www.theregister.com/2024/02/07/us_chinas_volt_typhoon_attacks/

Original Article Text

Click to Toggle View

US says China's Volt Typhoon is readying destructive cyberattacks. 12 international govt agencies sound the alarm, critical infrastructure at the heart of threats. The US government today confirmed that China's Volt Typhoon crew comprised "multiple" critical infrastructure org's IT networks, and warned that the state-sponored hackers are readying "disruptive or destructive cyberattacks" against these targets. The group compromised IT environments — primarily across communications, energy, transportation systems, and water and wastewater system sectors — in the continental and non-continental United States and its territories, including Guam. "Volt Typhoon's choice of targets and pattern of behavior is not consistent with traditional cyber espionage or intelligence gathering operations, and the US authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions," the 12 government agencies warned.  The authoring agencies are: the US Cybersecurity and Infrastructure Security Agency (CISA), US National Security Agency (NSA), US Federal Bureau of Investigation (FBI), US Department of Energy (DOE), US Environmental Protection Agency (EPA), US Transportation Security Administration (TSA), Australian Signals Directorate's (ASD's) Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), a part of the Communications Security Establishment (CSE), United Kingdom National Cyber Security Centre (NCSC-UK), and New Zealand National Cyber Security Centre (NCSC-NZ). According to the US agencies, Volt Typhoon will likely use this network access for disruptive attacks in the event of geopolitical tensions or military conflicts. This follow's last week's similar warning from FBI Director Christopher Wray that Chinese attackers are preparing to "wreak havoc" on American infrastructure, and the Justice Department's disclosure that Volt Typhoon infected "hundreds" of outdated Cisco and Netgear equipment with malware in an attempt to break into US critical infrastructure facilities. While the threat to American critical infrastructure appears to be the highest, should US facilities be disrupted, "Canada would likely be affected as well, due to cross-border integration," according to CCCS.  Australian and New Zealand critical infrastructure could be vulnerable as well. In addition to sounding the alarm, the governments issued a long list of technical details, TTPs observed in the digital break-ins, and detection recommendations and best practices.  Plus, there's three actions that owners and operators should take "today" to mitigate the threat. These include: apply patches for internet-facing systems with priority given to appliances that Volt Typhoon likes to exploit.  Second: turn on phishing-resistant multi-factor authentication (MFA). And finally, ensure that logging is turned on for applications, access and security logs, and store these logs in a centralized system.

Daily Brief Summary

NATION STATE ACTIVITY // US and Allies Warn of Chinese Cyber Group's Threat to Infrastructure

The US and 11 international government agencies issued a warning about China's Volt Typhoon group targeting critical infrastructure.

Volt Typhoon has infiltrated IT networks across the communications, energy, transportation, and water sectors in the US and its territories.

The group's conduct suggests a departure from espionage goals, with a focus on pre-positioning for potential disruptive or destructive cyberattacks.

The US agencies, including CISA, NSA, and FBI, express high confidence in Volt Typhoon's intent to exploit network access amid geopolitical tensions.

The FBI cautioned that Chinese hackers are equipped to "wreak havoc" on US infrastructure, with recent malware infections on Cisco and Netgear equipment.

Canada, Australia, and New Zealand's infrastructure could be affected due to interconnectedness and shared vulnerabilities with the US.

Governments have provided a list of technical details, observed TTPs, detection recommendations, and urged immediate actions to mitigate threats, such as applying patches, enabling MFA, and maintaining centralized logging systems.