Volt Typhoon in the Wild
ThreatLocker
Leading the industry towards a more secure approach of blocking unknown application vulnerabilities.
About Volt Typhoon
Volt Typhoon is a state-sponsored cyber actor associated with the People’s Republic of China. Traditionally, their activities have been limited to initial intrusion, information gathering, and data exfiltration. ThreatLocker has observed increased activity, which we believe is related to this threat actor.
We have observed them attempting to gather telemetry about the compromised network to include detailed information about which processes are currently running and which DLL’s are loaded by those processes. For additional information related to what other organizations have observed, see this CISA Cybersecurity Advisory.
Indicators of Comprise (IoC) Timeline
1.Tasklist.exe is executed. ?
This is used to gather information about all processes running on the compromised machine. In addition, it is used to list all the DLL’s loaded by each process. This information can be used to construct a future DLL Hijacking attack. Microsoft Documentation for this executable can be found here.
2.Mpcmdrun.exe is executed. ?
This is a dedicated command line tool used to manage Windows Defender. It can be used to check if you are vulnerable to CVE-2023-24934, an exploit which allows hackers to bypass Windows Defender. You can see a demonstration of this exploit on our Windows Defender Bypass blog.
3.Wmic.exe attempts to execute
Wmic.exe attempts to execute but is blocked by ThreatLocker. This is the WMI command-line utility. It has been deprecated as of Windows 10, version 21H1. Any attempted execution of this command should be viewed as suspicious.
4. Next steps
If Wmic.exe is not blocked by a default-deny policy like ThreatLocker provides, the attack will continue with data exfiltration including network scans and processes. This provides the attacker the recon needed to identify further opportunities for exploitation.
Recommendations for Everyone
领英推荐
3. Follow any other remediation steps you can in the “Mitigations” section of this cybersecurity advisory.
Recommendations for ThreatLocker Customers
References:
Subscribe to Get Newsletters and Blog Updates
Author:
Contributor:
Information Security Expert | Team Leader | Strategic Development
11 个月Great read. I have created a notification in our SIEM to alert anytime wmic us used. Going to use ThreatLocker for further prevention and mitigation.
Cybersecurity | Analytical | Cyber Risk Management
11 个月Very interesting read! I reviewed the reference posted but can't seem to find how " Mpcmdrun.exe" is linked to Volt Typhoon activities. Can the author provide a bit more context to this please?