Cyber Threat Report: 'Flax Typhoon using legitimate software to quietly access Taiwanese organizations'

Report Author Microsoft Threat Intelligence
Publication Date 2023-08-24
Original Reporting Source
Attributed to Nation China
Related Intrusion Sets Ethereal Panda , Flax Typhoon
Victim Sectors Technology, Manufacturing, National Government, Education

This blog post by Microsoft Threat Intelligence outlines the Flax Typhoon intrusion set and TTPs demonstrated by the group. It describes the actor as a nation-state group based in China which has been observed targeting dozens of organizations in Taiwan. The post outlines the tools and techniques used by the group. The researchers assess the groups motivation to be espionage. It also outlines how to defend against Flax Typhoon attacks, providing indicators of compromise to help detect associated activity.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1036 Masquerading Defense Evasion
T1546 Event Triggered Execution Persistence, Privilege Escalation
T1059 Command and Scripting Interpreter Execution
T1550 Use Alternate Authentication Material Defense Evasion, Lateral Movement
T1543 Create or Modify System Process Persistence, Privilege Escalation
T1572 Protocol Tunneling Command and Control
T1003 OS Credential Dumping Credential Access
T1505 Server Software Component Persistence
T1190 Exploit Public-Facing Application Initial Access
T1105 Ingress Tool Transfer Command and Control