Geopolitical tensions between China, the United States, and Taiwan have spilled over into a new, far more dangerous arena: cyberspace. A Chinese state-sponsored hacking group, identified as Volt Typhoon, is now at the center of global cybersecurity concerns.
Unlike typical cyber attacks, Volt Typhoon is not aimed at stealing money. Their mission is far more sinister: to conduct long-term infiltration and plant hidden access within the critical infrastructure of the US and Taiwan.
Volt Typhoon's activity is focused on espionage and what experts call 'pre-positioning'. Their targets are vital sectors such as energy, water, transportation, and communications.
The primary goal is believed to be establishing a foothold for future sabotage. If a military conflict or heightened political tension were to arise—for instance, over the issue of Taiwan—this pre-planted access could be activated to cripple vital civilian services, create chaos, and hinder a military response.
One of the signature traits that makes Volt Typhoon exceptionally difficult to detect is their use of the 'Living off the Land' (LotL) technique.
Instead of using custom malware or viruses that are easily flagged by antivirus software, they leverage tools and scripts already present within the target's operating system. They use native system features like PowerShell or Windows Management Instrumentation (WMI) to move within the network.
To security systems, their activity looks just like normal system administrator behavior. This allows them to blend in and hide within a victim's network for extended periods without detection.
To further cover their tracks, Volt Typhoon is also known for exploiting vulnerable Internet of Things (IoT) devices, such as old routers, security cameras, and smart home devices with outdated security.
These compromised devices are used as 'proxies' or stepping stones. This makes their attack traffic appear to originate from random locations worldwide, making it incredibly difficult to trace back to their actual command and control (C2) servers.
The attacks on US and Taiwanese infrastructure are a clear signal from China of its cyber warfare capabilities. For Taiwan, this is a constant threat aimed at intimidation and disrupting national stability.
Although the primary targets are the US and Taiwan, the techniques used by Volt Typhoon have global implications. Critical infrastructure in other countries, including Indonesia, is just as vulnerable to LotL tactics and IoT exploitation. This incident must serve as a serious warning for all nations to urgently strengthen their cybersecurity posture in protecting vital national assets.
Reference: https://csirt.or.id/berita/serangan-siber-china-as-taiwan
Need Any Technology Solution