Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network powered by N2K. And now a message from Blackcloak. Did you know the easiest way for cybercriminals to bypass your company's defenses is by targeting your executives and their families at home? Blackcloak's award winning digital executive protection platform secures their personal devices, home networks and connected lives. Because when executives are compromised at home, your company is at risk. In fact, over one third of new members discover they've already been breached. Protect your executives and their families 24 7, 365 with Black Cloak. Learn more at BlackCloak IO. Hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Silas Cutler (1:23)
And as we kind of evaluated it more and more, it's started to become clear that it looks like the activity that is the KD Net side likely may be a different actor or an actor working in direct support of Volt Typhoon, but it's a different set, likely a different set of hands on keyboard operators than those who are actually living off the land against high value targets.
Dave Bittner (1:48)
That's Silas Cutler, principal security researcher at Census. The research we're discussing today is titled Will the Real Volt Typhoon Please Stand. Well, let's back up just a little bit. And for folks who aren't following it too closely, how do you describe Volt Typhoon themselves?
Silas Cutler (2:13)
Yeah, so Volt Typhoon generally believed to be a threat actor that operates from the People's Republic of China. They have incredibly interesting trade craft they've gone after. And there was a report that came out a while ago from Microsoft, I believe, about Volt Typhoon conducting an intrusion into an organization in Guam. Unlike a lot of threat actors who rely on pieces of malware to maintain persistent access to a target, this group operates almost entirely manually, living off the land and using native available tools in order to accomplish their objectives and dig deep into these networks.
Dave Bittner (2:48)
Well, speaking of deep dives, I mean, you all took a deep dive into their recent activity. What was the first indication to you all that something had changed, that something new was happening?
Silas Cutler (3:00)
The thing that we've kind of tracked pretty closely as part of this group is with their first stage malware tooling the side that is part of that non attribution layer that they use before going after a target, the KB malware itself, the first stage server that it Communicates to has a distinct SSL certificate. So that ensures that the client and server are able to talk through encrypted communication. Following FBI disruption last year, usually that's a good time for an actor to change up their tooling, regenerate certificates and try and throw researchers off their tail. But with this group it seemed that they didn't. The certificate that they used had been consistent since pre FBI disruption and has been the way that we've been able to follow a lot of their servers since they were first exposed.
![Botnet’s back, tell a friend. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F58ab7ae0-def8-11ea-b34c-b35b208b0539%2Fimage%2Fdaily-podcast-cover-art-cw.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)