The United States and international cybersecurity authorities issued a joint
Cybersecurity Advisory (CSA) on 24 May 2023 to highlight a recently discovered cluster of activity of interest associated with a state-sponsored cyber actor also known as Volt Typhoon
The authoring agencies assess there is significant risk these Tactics, Techniques and Procedures (TTPs) could be employed by the actor against Critical Infrastructure (CI) and other sectors worldwide.
The WA SOC recommends informing all cyber security personnel of the advisory. Additionally WA public sector agencies are requested to investigate utilising their security event databases and report any suspicious or unexpected events to the WA SOC following the below guidance.
title:Volt Typhoon Huntlogsource:#service:category:product:windowsdetection:selection_hash:Hashes|contains:-baeffeb5fdef2f42a752c65c2d2a52e84fb57efc906d981f89dd518c314e231c-b4f7c5e3f14fb57be8b5f020377b993618b6e3532a4e1eb1eae9976d4130cc74-4b0c4170601d6e922cf23b1caf096bba2fade3dfcf92f0ab895a5f0b9a310349-c0fc29a52ec3202f71f6378d9f7f9a8a3a10eb19acb8765152d758aded98c76d-d6ab36cb58c6c8c3527e788fc9239d8dcc97468b6999cf9ccd8a815c8b4a80af-9dd101caee49c692e5df193b236f8d52a07a2030eed9bd858ed3aaccb406401a-450437d49a7e5530c6fb04df2e56c3ab1553ada3712fab02bd1eeb1f1adbc267-93ce3b6d2a18829c0212542751b309dacbdc8c1d950611efe2319aa715f3a066-7939f67375e6b14dfa45ec70356e91823d12f28bbd84278992b99e0d2c12ace5-389a497f27e1dd7484325e8e02bbdf656d53d5cf2601514e9b8d8974befddf61-c4b185dbca490a7f93bc96eefb9a597684fdf532d5a04aa4d9b4d4b1552c283b-e453e6efc5a002709057d8648dbe9998a49b9a12291dee390bb61c98a58b6e95-6036390a2c81301a23c9452288e39cb34e577483d121711b6ba6230b29a3c9ff-cd69e8a25a07318b153e01bba74a1ae60f8fc28eb3d56078f448461400baa984-17506c2246551d401c43726bdaec800f8d41595d01311cf38a19140ad32da2f4-8fa3e8fdbaa6ab5a9c44720de4514f19182adc0c9c6001c19cf159b79c0ae9c2-d17317e1d5716b09cee904b8463a203dc6900d78ee2053276cc948e4f41c8295-472ccfb865c81704562ea95870f60c08ef00bcd2ca1d7f09352398c05be5d05d-3e9fc13fab3f8d8120bd01604ee50ff65a40121955a4150a6d2c007d34807642selection_cmd:-CommandLine|contains|all:-cmd-wmic-caption-filesystem-CommandLine|contains|all:-ntds.dit-CommandLine|contains|all:-Secretsdump.py-CommandLine|contains|all:-Invoke-NinjaCopy-CommandLine|contains|all:-DSInternals-CommandLine|contains|all:-portproxy-netsh-add-CommandLine|contains|all:-Get-EventLog-'4624'-CommandLine|contains|all:-curl-www.ip-api.com-CommandLine|contains|all:-ldifde.exe-subtree-CommandLine|contains|all:-mimikatz.exe-CommandLine|contains|all:-reg-ss.dat-CommandLine|contains|all:-reg-sy.datcondition:1 of selection*
Additional behaviours and indicators can be found in the CSA, however due to the nature of the tactics, techniques and procedures (TTPs) in use, there is a high chance of detecting non-malicious events as well. Please review any detections with expected activities within your organisation, and contact the WA SOC if there is any uncertainty as to whether a detected event is suspicious.