Silas Cutler, Principal Security Researcher at Censys, dives into the enigmatic Volt Typhoon and its botnet, KV. He explains how the FBI's efforts disrupted infected systems without affecting the control infrastructure, suggesting a stealthy operator behind the scenes. Analysis reveals shifts in the botnet’s control servers in response to law enforcement. The conversation also tackles the challenges of attributing cyber threats, the strategic use of U.S. hosting for disguise, and the surprising links between patent databases and cybersecurity vulnerabilities.
Volt Typhoon exhibits sophisticated operations by employing manual techniques and maintaining consistent SSL certificates for tracking, indicating strategic planning amid disruptions.
The FBI's efforts against the KV Botnet highlight the challenges of targeting infrastructure, as Volt Typhoon's servers remain elusive and largely stable despite attempts to disrupt them.
Deep dives
Understanding Volt Typhoon's Operations
Volt Typhoon is identified as a threat actor operating primarily from China, employing unique tradecraft that differentiates it from other cybercriminals. This group often conducts operations manually, using available tools within targeted networks rather than relying on traditional malware. A key aspect of their operations can be seen in their first stage malware, which communicates through a consistent SSL certificate, allowing researchers to track their servers effectively. The unusual decision to maintain this certificate after a noted disruption by the FBI suggests a level of strategic planning or contractual constraints that may limit their operational changes.
Analyzing Server Infrastructure
Researchers utilized continuous internet scanning to identify and monitor the server infrastructure affiliated with Volt Typhoon. Notably, many of the first-stage control servers were found to be hosted within the United States, raising questions about the intent behind such operational choices. This placement may reflect a desire to evade detection by U.S. authorities, even following law enforcement operations aimed at disrupting these servers. Identification of server migrations and SSL certificates has proven crucial in uncovering the operational patterns and infrastructure of this threat actor.
Implications for Business Leaders
Volt Typhoon presents both espionage threats and potential cybersecurity risks for various organizations, particularly those within critical infrastructure sectors. Business leaders are advised to be vigilant about security practices, especially concerning commonly used devices that may be susceptible to exploitation. The risk exists that even organizations not directly targeted could inadvertently support this threat through compromised devices. Hence, keeping technology updated and adhering to robust security protocols is essential to mitigate risks such as those posed by Volt Typhoon.
This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure.
Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.