Insights, news, education and announcements from PolySwarm

Volt Typhoon's KV-Botnet

Written by The Hivemind | Jan 22, 2024 6:38:21 PM

Verticals Targeted: Government

Executive Summary

Volt Typhoon was observed compromising Cisco RV325 devices with KV-Botnet.

Key Takeaways

  • Volt Typhoon was observed compromising Cisco RV325 with KV-Botnet. 
  • Volt Typhoon, also known as Bronze Silhouette, is an espionage-focused China nexus state sponsored threat actor group. 
  • The threat actors appeared to be targeting government entities in the US, UK, and Australia. 
  • The group was also observed using previously unidentified infrastructure and a previously unspecified webshell. 

What is KV-Botnet?

Volt Typhoon was observed compromising Cisco RV325 devices with KV-Botnet. SecurityScorecard reported on this activity. The threat actors appeared to be targeting government entities in the US, UK, and Australia.

KV-Botnet is an extensive botnet consisting of firewalls and routers. It is used for covert data transfer, likely for espionage purposes. The threat actors have been using KV-Botnet since at least 2022.

Volt Typhoon reportedly compromised 30% of Cisco RV325 in 37 days. The group likely leveraged either CVE-2019-1653 or CVE-2019-1652 to compromise the devices. It is important to note that the Cisco RV325 devices have reached end of life, meaning Cisco no longer offers support for the devices and there will be no software updates to address the security issues.

SecurityScorecard researchers also discovered previously unidentified infrastructure used by the threat actors, as well as a previously unspecified webshell, known as fy.sh, on devices targeted by Volt Typhoon.

Black Lotus Labs recently reported on KV-Botnet as well and assessed that Volt Typhoon was likely developing new infrastructure for upcoming attacks. According to Black Lotus Labs, Volt Typhoon was also observed targeting DrayTek, Fortinet, and Netgear devices with KV-Botnet. They noted other China nexus threat actors may also be using KV-Botnet.

Who is Volt Typhoon?

Volt Typhoon, also known as Bronze Silhouette, is an espionage-focused China nexus state-sponsored threat actor group. The group has been active since at least 2021. Volt Typhoon is known to use LoLbins and web shells in their attacks. In 2023, Volt Typhoon was observed targeting US critical infrastructure. Targets included critical structure entities in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education verticals. The US Navy was among the group’s victims. 

IOCs

PolySwarm has multiple samples of KV-Botnet.

 

88fc3816c94f9b0191179f4e933843ee4cfdbcb392968605491a387b1235ec12

6a8230e66011e0a0012273f7d12110c23b1e33bd7232dc67a836662a3d1075c7

5a2681ea2e1d0d5e7db2a2499d2e6e27b2689830c638d5ee28c2eef9867ececf

9e6a2a01decc2c26f3586a119b6fd3a886c4cf9c76aa452339d164fda40c63e4

07118af421f14a7e07601639f44a72f6782757ae74d2afffdb531b8209697e7f

c524e118b1e263fccac6e94365b3a0b148a53ea96df21c8377ccd8ec3d6a0874

c71d04e2b6b35fdd058b4be5cf9ea3478697950378d4ee3c7fe0bf87e1e3730f

2711f1341d2f150a0c3e2d596939805d66ba7c6403346513d1fc826324f63c87

bf0ed245e897c7d1ada511db2939e8f3a879a96543f2651d5631339d5419bb75

19aa5a2235ee2518826a48363cb603060ee73ddccdf7d93bf197f97d7402aa37

8e35d8643c00d9e2993625b03366a7cd1bd36e6a60bc0c6039a509fccf9df150

f5271fcb895977dc1eead64415e525323cd412e3f2625aee2fafbb5674beea28

48299c2c568ce5f0d4f801b4aee0a6109b68613d2948ce4948334bbd7adc49eb

36c63d0c2a78497ccf555e84f0233a514943faeff38281d99d00baf5df23f184

08d0da0c36089f7a1f700b989f2f7825c5ba2549a20735d0bd1e64ca9c4885bc

c0871ecfe8b306074c6d376db14d966578a8511e5b5d355a4cf2c4d0b8c9deb9

b6226c3e0e4ad64bbda3e6a79eb464c7050faa25d1f5332dcac014d2e79dd87f

0279435f8727cca99bee575d157187787174d39f6872c2067de23afc681fe586

3fab16ec4643d8f6b9a99d85427322f7fb40e9ea3cd4de8318c6a52e29869d5a

86f01d5342ec39c65b1cff716f19c334cec26a82b87492d783d5e8f4ff9cb63a

d6cd1636569bba4131462bb8f45be1daa9a203aa343b6f2fd48a4847acfc29fa

b4f2470159ca93f9d585ae2df1da972f6d14a0c418ebc202a324b9be5c877b61

2cb6df289475457e807fc202a2b4688b2e23a88c94a8431981780caf8b76acf7

 

You can use the following CLI command to search for all KV-Botnet samples in our portal:

$ polyswarm link list -f KV-Botnet

 

You can use the following CLI command to search for all VoltTyphoon samples in our portal:

$ polyswarm link list -t VoltTyphoon

 

Don’t have a PolySwarm account? Go here to sign up for a free Community plan or to subscribe.

Contact us at
 
hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.