Microsoft Says China Has a Hold on American Telecom Infrastructure

SHARE THIS ARTICLE

The telecommunications infrastructure of the United States is being infiltrated by Chinese state-sponsored hackers, according to sources at Microsoft. The company said it has “uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States.” In a Microsoft Security blog post, the company said the attack is being carried out by Volt Typhoon, a government-backed actor based in China that typically focuses on espionage and information gathering and is “pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises.”

Microsoft said Volt Typhoon has targeted critical infrastructure organizations in Guam and elsewhere in the United States since 2021.  

“To achieve their objective, the threat actor puts strong emphasis on stealth in this campaign, relying almost exclusively on living-off-the-land techniques and hands-on-keyboard activity,” the blog post stated. “They issue commands via the command line to (1) collect data, including credentials from local and network systems, (2) put the data into an archive file to stage it for exfiltration, and then (3) use the stolen valid credentials to maintain persistence. In addition, Volt Typhoon tries to blend into normal network activity by routing traffic through compromised small office and home office (SOHO) network equipment, including routers, firewalls, and VPN hardware. They have also been observed using custom versions of open-source tools to establish a command and control (C2) channel over proxy to further stay under the radar.”

Barron’s reported a response from the Chinese government that denied the allegations, saying the Microsoft report was both “extremely unprofessional” and a “scissors-and-paste work.”

“It is clear that this is a collective disinformation campaign of the Five Eyes coalition countries, initiated by the U.S. for its geopolitical purposes,” foreign ministry spokeswoman Mao Ning said, according to Barron’s.

Microsoft provided details on how Microsoft 365 Defender detects malicious and suspicious activity to protect organizations from such stealthy attacks. The National Security Agency has also published a Cybersecurity Advisory which contains a guide for the tactics, techniques, and procedures discussed in their blog entitled “People’s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection.”

Reader Interactions

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.