Volt Typhoon is a Chinese state-sponsored advanced persistent threat (APT) group, also known by aliases such as Vanguard Panda, Bronze Silhouette, Dev-0391, UNC3236, Voltzite, and Insidious Taurus. The group has been active since at least mid-2021 and is primarily focused on targeting U.S. critical infrastructure sectors, including communications, energy, transportation, and water systems. Volt Typhoon’s operations are characterized by stealth, persistence, and a focus on pre-positioning within networks for potential disruptive or destructive attacks, especially in the event of geopolitical tensions or military conflict involving the United States.
Key Characteristics
• Affiliation: Believed to operate on behalf of the People’s Republic of China (PRC), likely linked to the People’s Liberation Army.
• Primary Objectives: Pre-positioning in IT networks to enable lateral movement to operational technology (OT) assets, with the goal of disrupting or destroying critical services during crises.
• Target Sectors: Communications, energy, transportation, water and wastewater, and other critical infrastructure in the U.S. and its territories (notably Guam), as well as allied countries.
• Tactics: Extensive use of “living off the land” (LOTL) techniques, leveraging legitimate administrative tools and valid credentials for persistence and lateral movement, rather than deploying traditional malware. They frequently exploit vulnerabilities in internet-facing appliances (Fortinet, Cisco, NETGEAR, etc.) and use compromised SOHO devices as proxies to hide their activity.
Techniques and Procedures
• Initial Access: Exploitation of vulnerabilities in public-facing network appliances (e.g., Fortinet, Cisco, NETGEAR, Ivanti, Citrix).
• Persistence: Use of valid credentials, VPN sessions, and minimal malware to blend in with legitimate traffic.
• Lateral Movement: RDP, PSExec, and use of stolen credentials to access domain controllers and OT systems.
• Data Collection: Focus on gathering information that would facilitate follow-on actions with physical impacts, such as SCADA diagrams and OT network details.
• Command and Control: Proxying C2 traffic through compromised SOHO routers and VPS infrastructure, often using self-signed certificates and encrypted channels.
Indicators of Compromise (IP Addresses)
Volt Typhoon’s infrastructure is highly dynamic, but recent public threat intelligence reports have attributed the following IP addresses to their campaigns (replace “.” with “.” for use):
174.138.56.21 | C2 proxy for botnet activity |
159.203.113.25 | C2 proxy for botnet activity |
159.203.72.166 | DigitalOcean infrastructure |
144.202.49.189 | Vultr infrastructure |
45.63.60.39 | JDY cluster C2 |
45.32.174.131 | JDY cluster C2 |
45.11.92.176 | Payload server for webshells |
82.117.159.158 | Frequent C2 communication |
46.10.197.206 | Newly identified IoC |
176.102.35.175 | Newly identified IoC |
93.62.0.77 | Newly identified IoC |
194.50.159.3 | Newly identified IoC |
80.64.80.169 | Newly identified IoC |
24.212.225.54 | Newly identified IoC |
208.97.106.10 | Newly identified IoC |
70.60.30.222 | Newly identified IoC |
184.67.141.110 | Newly identified IoC |