FBI Director Christopher Wray called Volt Typhoon "the defining threat of our generation." Unlike ransomware groups or data thieves, Volt Typhoon has a single goal: quietly embed themselves inside US critical infrastructure networks and wait. No data exfiltration, no ransom notes — just pre-positioned access that can be activated during a geopolitical crisis.
What makes them genuinely different from every other APT is their discipline. They use zero custom
malware. Every action is performed through built-in operating system tools — cmd.exe,
wmic, netsh, PowerShell. There are no IOCs to signature on. This
forced me to fundamentally rethink how detection works when every artifact looks exactly like legitimate
admin activity.
| Tactic | Technique | Simulation Tool |
|---|---|---|
| Initial Access | T1190 — Exploit Public-Facing Application (Versa Director CVE-2024-39717) | versa_director_exploit.cpp |
| Initial Access | T1566.002 — Spearphishing Link (FortiGate VPN credential phishing) | fortigate_phish/ |
| Execution | T1059.001 — PowerShell (LOTL discovery commands) | lotl_discovery.ps1 |
| Discovery | T1082 / T1049 / T1016 — System, Network, and Config Discovery | lotl_recon.py |
| Command & Control | T1090.002 — SOCKS5 Proxy via KV-Botnet | kv_botnet_proxy.py |
| Defense Evasion | T1562.001 — Disable Security Tools (wevtutil log clearing) | lotl_recon.py |
The simulation's recon module calls the exact same binaries a sysadmin would use —
systeminfo, netstat, ipconfig, wevtutil,
wmic. There's nothing to detect based on the individual commands. But the pattern
matters: running systeminfo, then immediately dumping the DNS cache, then querying security products via
WMI, then clearing specific event logs — that behavioral sequence is what detection has to key on.
Building this taught me why behavioral detection (UEBA) is essential for LOTL threats. Traditional SIEM rules that alert on individual commands would fire on every sysadmin doing morning checks. You need temporal correlation — a rule that triggers when 5+ native discovery commands run in sequence within 60 seconds from the same session, especially combined with log clearing.
Volt Typhoon routes all C2 traffic through compromised SOHO routers — Cisco RV320s, Netgear ProSAFEs, DrayTek Vigor devices. They deployed the KV-Botnet, which turns these routers into SOCKS5 proxy nodes. The traffic appears to originate from a legitimate small business router, making it nearly impossible to block by IP reputation.
I implemented a full RFC 1928 SOCKS5 proxy to understand how this works at the protocol level. The three-phase handshake is straightforward but the details were revealing:
The key insight: when you're a network defender and you see SOCKS5 traffic coming from a legitimate edge device, there's nothing inherently suspicious about it. You need to correlate traffic patterns — long-lived tunnel sessions with periodic low-volume beaconing — and cross-reference with threat feeds tracking known compromised SOHO devices. This is exactly why CISA pushed the "Secure by Design" initiative for router manufacturers.
In mid-2024, Volt Typhoon exploited a zero-day in Versa Director — the management platform used by ISPs
and MSPs to orchestrate SD-WAN infrastructure. The vulnerability was in an unrestricted file upload
endpoint in the /vnms/devicereg/uploadFileToDevice path. By uploading a specially crafted
Java servlet (a .war file containing a web shell), they gained code execution on the
management server — which controls the entire SD-WAN fabric.
The C++ exploit simulation crafts the multipart HTTP request, uploads the malicious servlet, and interacts with the resulting web shell. What made this attack devastating wasn't the technical complexity — it was the target selection. Compromising a Versa Director instance gave them access to every downstream network managed through that SD-WAN.
Volt Typhoon also uses targeted credential phishing against network administrators. The simulation includes a pixel-perfect clone of the FortiGate SSL-VPN login portal, complete with proper CSS, the Fortinet logo, and JavaScript validation. Captured credentials are logged server-side and the victim is redirected to the real VPN portal with a "session expired" message — they log in again on the real page and never realize anything happened.
This technique is effective because VPN login pages are inherently expected by users. A typosquat domain
like vpn-fortinet-corp.com sent from a spoofed IT department email is all it takes. The
simulation demonstrates why MFA on VPN infrastructure is non-negotiable.
Key Challenge: Volt Typhoon generates zero malware artifacts. Detection must be entirely behavioral — command sequence analysis, anomalous SOCKS5 tunnels from edge devices, and correlation of admin tool usage with threat intelligence on compromised SOHO infrastructure.
What to hunt for:
1. Multiple native discovery commands (systeminfo, netstat, wmic)
executed in rapid succession from a single session
2. Event log clearing (wevtutil cl) following reconnaissance activity
3. Long-duration SOCKS5 connections from SOHO devices to internal infrastructure
4. Unusual inbound connections to SD-WAN management platforms
5. VPN authentication attempts from IPs associated with residential proxy networks
Full simulation code available on GitHub.