The Highly Secretive Five Eyes Alliance Has Disrupted a China-Backed Hacker Group

Flags of Australia, Canada, the U.S., the UK, and New Zealand with the image of an eye on them to symbolize the Five Eyes alliance.

Using stealth techniques, the attacker – referred to as “Volt Typhoon” – exploited existing resources in compromised networks in a technique called 'living off the land'. (Image: Dennis Desmond)

This week the Five Eyes alliance — an intelligence alliance between Australia, the United Kingdom, Canada, New Zealand, and the United States — announced its investigation into a China-backed threat targeting U.S. infrastructure.

Using stealth techniques, the attacker — referred to as “Volt Typhoon” — exploited existing resources in compromised networks in a technique called “living off the land.”

Subscribe to our Newsletter!

Receive selected content straight into your inbox.

Microsoft made a concurrent announcement, stating the attackers’ targeting of Guam was telling of China’s plans to potentially disrupt critical communications infrastructure between the U.S. and Asian region in the future.

This comes hot on the heels of news in April of a North Korean supply chain attack on Asia-Pacific telecommunications provider 3CX. In this case, hackers gained access to an employee’s computer using a compromised desktop app for Windows and a compromised signed software installation package.

The Volt Typhoon announcement has led to a rare admission by the U.S. National Security Agency that Australia and other Five Eyes partners are engaged in a targeted search and detection scheme to uncover China’s clandestine cyber operations.

Such public admissions from the Five Eyes alliance are few and far between. Behind the curtain, however, this network is persistently engaged in trying to take down foreign adversaries. And it’s no easy feat.

Let’s take a look at the events leading up to Volt Typhoon — and more broadly, at how this secretive transnational alliance operates.

Uncovering Volt Typhoon

Volt Typhoon is an “advanced persistent threat group” that has been active since at least mid-2021. It’s believed to be sponsored by the Chinese government and is targeting critical infrastructure organizations in the U.S.

The group has focused much of its efforts on Guam. Located in the Western Pacific, this U.S. island territory is home to a significant and growing U.S. military presence, including the air force, a contingent of the marines, and the U.S. navy’s nuclear-capable submarines.

Australia wasn’t directly impacted by Volt Typhoon, according to official statements. Nevertheless, it would be a primary target for similar operations in the event of a conflict. (Image: jorono via Pixabay)

It’s likely the Volt Typhoon attackers intended to gain access to networks connected to U.S. critical infrastructure to disrupt communications, command and control systems, and maintain a persistent presence on the networks. The latter tactic would allow China to influence operations during a potential conflict in the South China Sea.

Australia wasn’t directly impacted by Volt Typhoon, according to official statements. Nevertheless, it would be a primary target for similar operations in the event of a conflict.

As for how Volt Typhoon was caught, this hasn’t been disclosed. But Microsoft documents highlight previous observations of the threat actor attempting to dump credentials and stolen data from the victim organization. It’s likely this led to the discovery of compromised networks and devices.

Living-off-the-land

The hackers initially gained access to networks through Internet-facing Fortinet FortiGuard devices, such as routers. Once inside, they employed a technique called “living-off-the-land.”

This is when attackers rely on using the resources already contained within the exploited system, rather than bringing in external tools. For example, they will typically use applications such as PowerShell (a Microsoft management program) and Windows Management Instrumentation to access data and network functions.

The hackers initially gained access to networks through internet-facing Fortinet FortiGuard devices, such as routers. Once inside, they employed a technique called ‘living-off-the-land.’ (Image: TheDigitalArtist via Pixabay)

By using internal resources, attackers can bypass safeguards that alert organizations to unauthorized access to their networks. Since no malicious software is used, they appear as a legitimate user. As such, living-off-the-land allows for lateral movement within the network, and provides an opportunity for a persistent, long-term attack.

The simultaneous announcements from the Five Eyes partners point to the seriousness of the Volt Typhoon compromise. It will likely serve as a warning to other nations in the Asia-Pacific region.

Who are the Five Eyes?

Formed in 1955, the Five Eyes alliance is an intelligence-sharing partnership comprising Australia, Canada, New Zealand, the UK, and the U.S.

The alliance was formed after World War II to counter the potential influence of the Soviet Union. It has a specific focus on signals intelligence. This involves intercepting and analyzing signals, such as radio, satellite, and Internet communications.

The members share information and access to their respective signals intelligence agencies, and collaborate to collect and analyze vast amounts of global communications data. A Five Eyes operation might also include intelligence provided by non-member nations and the private sector.

Recently, the member countries expressed concern about China’s de facto military control over the South China Sea, its suppression of democracy in Hong Kong, and threatening moves toward Taiwan. The latest public announcement of China’s cyber operations no doubt serves as a warning that Western nations are paying strict attention to their critical infrastructure — and can respond to China’s digital aggression.

In 2019, Australia was targeted by Chinese state-backed threat actors gaining unauthorized access to Parliament House’s computer network. Indeed, there is evidence that China is engaged in a concerted effort to target Australia’s public and private networks.

The Five Eyes alliance may well be one of the only deterrents we have against long-term, persistent attacks against our critical infrastructure.

Dennis B. Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Follow us on TwitterFacebook, or Pinterest

Recommended Stories

A rock with 'friends' written on it.

Why Having a Wide Circle of Friends Is Good

Having a healthy body is often linked with a strict workout regimen and diet. However, ...

A Chinese Navy ship.

China Harasses U.S. Troops Stationed in Djibouti

Rear Admiral Heidi Berg, director of intelligence at the U.S. Africa Command, has accused the ...

A woman fanning herself during the heatwave.

Europe Reeling Under a Dangerous Heatwave

People in Europe are currently suffering through one of the worst heatwaves in the region’s ...

A construction worker.

Extreme Heat Poses ‘Unacceptably High’ Health Risk Worldwide

Rising temperatures and extreme heat as a result of climate change are already exposing people ...

A young woman at the top of a mountain.

Get Up and Walk: Counting the Steps to Good Health

Walking has long been seen as an ideal way for people to get fit without ...

A woman walking.

Kim Denmark Walking Across America for Homeless Vets

Kim Denmark is no ordinary woman. This 59-year-old from Ohio has been walking across America ...

martial artist practicing at sunset.

Using Divine Powers, Zhang Sanfeng Promoted Good and Punished Evil

Zhang Sanfeng, born circa A.D. 1247, the founder of Tai Chi, was a cultivator in ...

U.S. President Donald trump.

The CCP’s End? America Striking Deadly Blows to Chinese Communist Officials

With China reeling under pressure from the trade war with America and strong protests in ...

A young woman working at a laptop.

New Job Trends: Being a Digital Nomad Is the Preferred Work-Life Option

Traditionally, being an employee meant a 9 to 5 job commuting to the office every ...

Send this to a friend