Also known as: VANGUARD PANDA, Bronze Silhouette, DEV-0391, Insidious Taurus, UNC3236, Redfly, Storm-0391, VOLTZITE
T1218.011
T1003.003
T1016
T1049
T1057
T1090.002
T1584.008
T1112
T1090.001
T1584.004
T1027.002
T1021.004
T1069.002
T1087.002
T1560.001
T1136.001
T1136.002
T1505.003
T1550.002
T1550.003
T1021.006
T1036.004
Primary tool for reconnaissance and command execution. Used with encoded commands to query AD, enumerate network shares, and gather system information without deploying malware.
Windows utility abused to create snapshots of the Active Directory database (NTDS.dit) for offline credential extraction and domain-wide access.
Used to configure port proxying and firewall rules on compromised systems, enabling traffic forwarding through operational relay networks.
Windows Management Instrumentation CLI used for remote process execution, system enumeration, and lateral movement without deploying additional tools.
Abused for file transfers (downloading tools from C2), Base64 encoding/decoding, and certificate manipulation on compromised systems.
Active Directory utility used to export directory data for offline analysis, mapping organizational structure and identifying high-value targets.
Open-source reverse proxy tool used to create encrypted tunnels from compromised networks to external C2 infrastructure, often with modified binaries.
Python toolkit used for wmiexec remote execution, secretsdump credential extraction, and SMB relay attacks during lateral movement phases.
Deployed sparingly for credential extraction. Volt Typhoon prefers NTDS.dit offline extraction to avoid triggering LSASS memory access alerts.
SOCKS5 proxy tool used to create multi-hop tunnels through compromised systems, enabling access to isolated network segments.
Command interpreter used to chain living-off-the-land binaries, execute batch scripts for reconnaissance, and manage compromised SOHO router access.
Compromises Fortinet FortiGuard, ASUS, Cisco, D-Link, Netgear, and Zyxel routers to create operational relay box (ORB) networks that proxy C2 traffic.
Network scanning tool used for initial reconnaissance of target infrastructure, port scanning, and service enumeration of critical infrastructure networks.
GUI-based network scanner used to map internal network topology, identify live hosts, and discover shared resources on compromised networks.
Sysinternals utility used for remote command execution on Windows systems. Enables lateral movement using harvested credentials.
Registry command-line tool used to query and modify registry keys for persistence, disabling security features, and extracting cached credentials.
Legitimate reverse proxy tool abused for command and control
| Type | Value |
|---|---|
| ip | 104[.]161[.]54[.]203 |
| ip | 185[.]106[.]92[.]12 |
| domain | gosloede[.]com |
| hash | baeffeb5fdef2f42a752c65c2d2a52e84fb57efc906d981f89dd518c314e231c |
| Domain / Host | Status |
|---|---|
104[.]161[.]54[.]203Compromised SOHO router used as relay infrastructure | offline |
185[.]106[.]92[.]12Operational relay box (ORB) infrastructure | offline |
gosloede[.]comC2 domain identified in critical infrastructure targeting | offline |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
Microsoft - Volt Typhoon targets US critical infrastructure
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
CISA - PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
CrowdStrike - VANGUARD PANDA
https://www.crowdstrike.com/blog/falcon-complete-thwarts-vanguard-panda-tradecraft/
Dragos 2026 OT/ICS Cybersecurity Year in Review - VOLTZITE Elevated to Stage 2
https://www.dragos.com/resources/press-release/dragos-2026-year-in-review-new-ot-threats-ransomware
Volt Typhoon Maintained Access to Massachusetts Utility for 10 Months - The Record
https://therecord.media/volt-typhoon-hackers-utility-months
Microsoft Threat Intelligence - Volt Typhoon Targets US Critical Infrastructure
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques
Dragos: Researchers Warn Volt Typhoon Still Embedded in US Utilities - The Record
https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure
CISA Cybersecurity Advisory - PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a
NSA/FBI Joint Cybersecurity Advisory - People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection
https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF
Secureworks - Bronze Silhouette Targets US Critical Infrastructure
https://www.secureworks.com/research/bronze-silhouette-targets-us-critical-infrastructure