Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: McGruff

Alas, security that depends on the expertise, diligence and loyalty of humans is bound to fail.

>>Volt Typhoon achieves initial access to targeted organizations through internet-facing Fortinet FortiGuard devices. Microsoft continues to investigate Volt Typhoon’s methods for gaining access to these devices.

>>The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials.

>>Volt Typhoon proxies all its network traffic to its targets through compromised SOHO network edge devices (including routers). Microsoft has confirmed that many of the devices, which include those manufactured by ASUS, Cisco, D-Link, NETGEAR, and Zyxel, allow the owner to expose HTTP or SSH management interfaces to the internet. Owners of network edge devices should ensure that management interfaces are not exposed to the public internet in order to reduce their attack surface. By proxying through these devices, Volt Typhoon enhances the stealth of their operations and lowers overhead costs for acquiring infrastructure.


21 posted on 05/24/2023 1:54:26 PM PDT by FarCenter
[ Post Reply | Private Reply | To 1 | View Replies ]


To: FarCenter

Which begs the question, how much of the COVID fraud $$ went to ChyNa? Unemployment Insurance, Payroll Protection, Shared Work et al? Asking for the Taxpayers.


30 posted on 05/24/2023 2:30:06 PM PDT by Shady (The Force of Liberty must prevail for the sake of our Children and Grandchildren...)
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson