Microsoft: Chinese hackers targeted critical infrastructure organisations, warns Microsoft

State-sponsored cyberattacks have become common in the last few years. Microsoft has issued a warning about Chinese hackers targeting critical infrastructure organisations in the US. In a blog post, the company said that the attack is carried out by Volt Typhoon, a state-sponsored actor based in China that typically “focuses on espionage and information gathering.”

Volt Typhoon ‘hits’ America

According to Microsoft, Volt Typhoon has been active since mid-2021 and has targeted critical infrastructure organisations in Guam and elsewhere in the United States. “In this campaign, the affected organisations span the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors,” said Microsoft in the blog. What’s worrying is that, as per Microsoft, the threat actor can do espionage and get access without being detected for a while.
One of the ways Volt Typhoon gains access is through Fortinet FortiGuard devices. “The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials,” explained Microsoft in the blog.
The company said that it is investigating how hackers are gaining access to Fortinet devices. Microsoft has also confirmed that many of the devices, which include those manufactured by ASUS, Cisco, D-Link, NETGEAR, and Zyxel, allow the owner to expose HTTP or SSH management interfaces to the internet. “By proxying through these devices, Volt Typhoon enhances the stealth of their operations and lowers overhead costs for acquiring infrastructure,” said Microsoft.
Microsoft has also shared tips in case any device has been compromised. Organisations should close or change credentials for all compromised accounts as depending on the level of collection activity, many accounts may be affected. Further, organisations should identify LSASS dumping and domain controller installation media creation to identify affected accounts.

function loadGtagEvents(isGoogleCampaignActive) { if (!isGoogleCampaignActive) { return; } var id = document.getElementById('toi-plus-google-campaign'); if (id) { return; } (function(f, b, e, v, n, t, s) { t = b.createElement(e); t.async = !0; t.defer = !0; t.src = v; = 'toi-plus-google-campaign'; s = b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t, s); })(f, b, e, '', n, t, s); };

window.TimesApps = window.TimesApps || {}; var TimesApps = window.TimesApps; TimesApps.toiPlusEvents = function(config) { var isConfigAvailable = "toiplus_site_settings" in f && "isFBCampaignActive" in f.toiplus_site_settings && "isGoogleCampaignActive" in f.toiplus_site_settings; var isPrimeUser = window.isPrime; if (isConfigAvailable && !isPrimeUser) { loadGtagEvents(f.toiplus_site_settings.isGoogleCampaignActive); loadFBEvents(f.toiplus_site_settings.isFBCampaignActive); } else { var JarvisUrl=""; window.getFromClient(JarvisUrl, function(config){ if (config) { loadGtagEvents(config?.isGoogleCampaignActive); loadFBEvents(config?.isFBCampaignActive); } }) } }; })( window, document, 'script', );

Source link

Leave a Reply

Your email address will not be published.