Volt Typhoon continues to pose a significant threat to U.S. critical infrastructure, targeting IT networks in key sectors such as Communications, Energy, Transportation Systems, and Water and Wastewater Systems. Their ultimate goal? To pre-position themselves for potential disruption or destruction of essential systems and services. But what sets Volt Typhoon apart from other threat actors?
In this session, we’ll dive into the novel ways Volt Typhoon elevates common tactics—such as enumerating users and enterprise assets, lateral movement, and leveraging LOLBAS (Living Off the Land Binaries and Scripts). These seemingly mundane actions are taken to new and sophisticated levels, making their approach uniquely challenging to detect and counter.
By the end of this talk, you’ll gain a deeper understanding of Volt Typhoon’s methods, actionable insights into their operations, and practical strategies to detect and defend against this electrifying threat actor. Don’t miss it!