City
Epaper

China-sponsored hackers targeting critical US infrastructure: Microsoft

By IANS | Updated: May 25, 2023 09:55 IST

San Francisco, May 25 Microsoft has revealed that a state-sponsored hacker group called Volt Typhoon based in China, ...

Open in App

San Francisco, May 25 Microsoft has revealed that a state-sponsored hacker group called Volt Typhoon based in China, that typically focuses on espionage and information gathering, is targeting critical US infrastructure.

The tech giant uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organisations in the US.

"The attack was carried out by Volt Typhoon, a state-sponsored actor based in China. This campaign is pursuing development of capabilities that could disrupt critical communications infrastructure between the US and Asia region during future crises," the company said in a blog post late on Wednesday.

Volt Typhoon has been active since mid-2021 and has targeted critical infrastructure organisations in Guam and elsewhere in the country.

The affected organisations span the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors.

"Observed behaviour suggests that the threat actor intends to perform espionage and maintain access without being detected for as long as possible," said Microsoft.

The company said it has directly notified targeted or compromised customers, providing them with important information needed to secure their environments.

Volt Typhoon achieves initial access to targeted organisations through internet-facing "Fortinet FortiGuard devices".

"The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials," the team explained.

Once Volt Typhoon gains access to a target environment, they begin conducting hands-on-keyboard activity via the command line.

Some of these commands appear to be exploratory or experimental, as the operators adjust and repeat them multiple times, said Microsoft.

Volt Typhoon rarely uses malware in their post-compromise activity.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: San FranciscoasiamicrosoftNikkei Asian ReviewChannel News AsiaAir Asia IndiaAsia IndiaAsian Development BankSoutheast AsiaSouth AsiaSouth Asian Association For Regional Cooperation
Open in App

Related Stories

EntertainmentMen in Black Actor Tommy Lee Jones’ Daughter Victoria Jones Found Dead at San Francisco Hotel on New Year’s Day

MumbaiMumbai and Bengaluru Non-Stop San Francisco Flights to Be Discontinued by Air India from March 1

InternationalSan Francisco Power Outage: Nearly 130,000 Homes Without Power After Fire at PG&E Substation

InternationalSan Francisco Earthquake: 4.3 Magnitude Tremor Jolts Bay Area at 3 AM, No Tsunami Threat

NationalAir India to Suspend Direct Delhi–Washington Services from September 1, Offers Alternate Routes

Technology Realted Stories

TechnologyEV charging hub unveiled at Anand Vihar Namo Bharat Station, 10 vehicles can be charged simultaneously

TechnologyAmaravati to be growth engine for $2.4 trillion economy: Andhra CM​

TechnologyJan Vishwas Bill, 2026 decriminalises minor offences in health sector

TechnologyFood prices to rise further globally if West Asia crisis stretches beyond 40 days: FAO

TechnologyGoogle now allow Gmail users to change their usernames