Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
Menu
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
  1. Home
  2. News
  3. Microsoft identifies Flax Typhoon: a Chinese state-backed hacking campaign targeting Taiwanese organizations

Microsoft identifies Flax Typhoon: a Chinese state-backed hacking campaign targeting Taiwanese organizations

Pranav Bhardwaj Pranav Bhardwaj
August 25, 2023
3 min read

Microsoft has uncovered a series of concerning activities aimed at organizations primarily located in Taiwan. This campaign, attributed to Flax Typhoon (also connected to ETHEREAL PANDA), is suspected to be orchestrated by a nation-state actor based in China. 

The operation involves sophisticated techniques that could be replicated in other regions, raising concerns about potential global implications. Microsoft has chosen to make this threat public due to the significant risks it poses and the need for collective vigilance within the security community.

The Flax Typhoon campaign has been in operation since mid-2021, with its primary targets encompassing government agencies, education institutions, critical manufacturing, and information technology organizations within Taiwan. Although the impact has been concentrated in Taiwan, certain victims have also been identified in Southeast Asia, North America, and Africa. 

Flax Typhoon’s tactics are centered around persistence, lateral movement, and acquiring credential access. As per established practices, Microsoft has directly notified affected parties to help bolster their security measures.

Preventive measures to counter Flax Typhoon

To respond effectively to suspected compromises, organizations are advised to take the following steps:

  • Identify Compromised Accounts or Systems:
    • Locate instances of LSASS and SAM dumping to detect affected accounts.
    • Scrutinize compromised accounts for malicious activities or exposed data.
    • Invalidate or modify credentials for all compromised accounts, considering the potential scope of compromise.
    • Isolate and meticulously examine affected systems for traces of malicious actions.
  • Defend Against Flax Typhoon Attacks:
    • Maintain updated security patches for public-facing servers, which are attractive targets for threat actors.
    • Employ methods like user input validation, file integrity monitoring, behavioral monitoring, and web application firewalls for enhanced server security.
    • Monitor the Windows registry for unauthorized modifications, leveraging the Audit Registry feature.
    • Utilize network monitoring and intrusion detection systems to spot unusual or unauthorized network traffic.
    • Ensure Windows systems are up-to-date with the latest security patches, including MS16-075.

How to mitigate the risk of compromised accounts

Microsoft also recommends several strategies to mitigate the risk of compromised accounts and systems:

  • Enforce Strong Authentication:
    • Implement robust multifactor authentication (MFA) policies involving hardware security keys or Microsoft Authenticator.
    • Leverage passwordless sign-in methods, such as Windows Hello and FIDO2 security keys, to reduce vulnerability.
    • Set password expiration rules and deactivate unused accounts to curtail risk.
  • Enhance Security Measures:
    • Randomize Local Administrator passwords using tools like Local Administrator Password Solution (LAPS).
    • Employ attack surface reduction rules to block or audit identified malicious activity patterns.
    • Strengthen LSASS process security with features like Protective Process Light (PPL) and Windows Defender Credential Guard.
    • Implement cloud-delivered protection in Microsoft Defender Antivirus for dynamic threat coverage.
  • Deploy Endpoint Detection and Response (EDR):
    • Utilize EDR in block mode to enable Microsoft Defender for Endpoint to neutralize threats even when other antivirus systems are passive.

The exposure of Flax Typhoon’s operations underscores the importance of robust security practices and collaboration across the security landscape. Microsoft’s proactive approach aims to empower organizations and the security community at large to bolster defenses against evolving threats like the Flax Typhoon.

Via: Tech Times

Related

Share this article:
Previous Article Google Calendar finally displays Microsoft Outlook organizers in attendee list Next Article Bing Chat debuts on Microsoft Launcher and Surface Duo in latest beta build

Related Articles

Meta considers major layoffs while pouring billions into AI

March 15, 2026
MacBook Neo Looks Impressive Until You See the 8GB RAM

MacBook Neo Looks Impressive Until You See the 8GB RAM

March 15, 2026

Instagram Will Stop Supporting Encrypted DMs Starting May 2026

March 15, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Meta considers major layoffs while pouring billions into AI
  • MacBook Neo Looks Impressive Until You See the 8GB RAM
  • Instagram Will Stop Supporting Encrypted DMs Starting May 2026
  • Chrome tests Gemini Live voice assistant in a floating overlay panel
  • Chrome’s Organizer feature may sync Gemini and AI conversations across devices

Recent Comments

No comments to show.
OnMSFT.com

OnMSFT.com covers Microsoft news, reviews, and how-to guides. Formerly known as WinBeta, we have been your source for Microsoft news since 1998.

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • Meta considers major layoffs while pouring billions into AI
  • MacBook Neo Looks Impressive Until You See the 8GB RAM
  • Instagram Will Stop Supporting Encrypted DMs Starting May 2026
  • Chrome tests Gemini Live voice assistant in a floating overlay panel
  • Chrome’s Organizer feature may sync Gemini and AI conversations across devices

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
  • Privacy Policy
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFTPrivacy Policy