Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Government

Five Eyes Agencies Issue New Alert on Chinese APT Volt Typhoon

Government agencies in the Five Eyes countries warn critical infrastructure entities of Chinese state-sponsored hacking group Volt Typhoon.

Chinese APT

Government agencies in the US, UK, Canada, Australia, and New Zealand are warning critical infrastructure entities of the threat posed by Volt Typhoon, a Chinese state-sponsored group that hacked thousands of organizations worldwide.

Following a February CISA advisory on Volt Typhoon pre-positioning itself in critical infrastructure organizations’ networks for disruption or destruction purposes, the Five Eyes agencies are now providing guidance on how critical infrastructure entities can defend against the threat.

The advanced persistent threat (APT) actor successfully hacked US communications, energy, transportation systems, and water and wastewater organizations, the Five Eyes advisory (PDF) notes.

To defend against the risk associated with Volt Typhoon, leaders of critical infrastructure entities should empower cybersecurity teams to make informed resourcing decisions, including by using intelligence-informed prioritization tools, the agencies say.

They should also empower cybersecurity teams to effectively apply detection and hardening best practices, receive continuous cybersecurity training and skill development, and develop comprehensive information security plans.

“Volt Typhoon does not rely on malware to maintain access to networks and conduct their activity. Rather, they use built-in functions of a system. This technique, known as ‘living off the land,’ enables them to easily evade detection. To protect against living off the land, organizations need a comprehensive and multifaceted approach,” the advisory reads.

Advertisement. Scroll to continue reading.

Smaller organizations that do not have a cybersecurity team should obtain managed security services, the Five Eyes agencies say.

Organizations are also advised to secure their supply chain by establishing strong vendor risk management processes, ensuring due diligence is exercised for procurement, ensuring vendors enable interoperability as a best practice, and identifying and limiting the use of products that break the principle of least privilege.

The guidance also recommends implementing incident response plans and reviewing and updating them regularly, and immediately reporting incidents to one of the authoring agencies.

Critical infrastructure organization leaders are urged to read the guidance and apply the recommendations to defend against Volt Typhoon and similar threats.

Related: US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon

Related: China-Linked Volt Typhoon Hackers Possibly Targeting Australian, UK Governments

Related: Mandiant Intelligence Chief Raises Alarm Over China’s ‘Volt Typhoon’ Hackers in US Critical Infrastructure

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.