Flax Typhoon Masquerading SoftEther VPN as Legitimate Windows Binaries
The Flax Typhoon group uses SoftEther VPN, masquerading the VPN client as legitimate Windows binaries like conhost.exe and dllhost.exe, to obfuscate their network activity within compromised Taiwanese organizations.
The Flax Typhoon group has been observed using SoftEther VPN software to hide their network activity after gaining access to Taiwanese organizations. This activity, observed as of August 2023, involves renaming the SoftEther VPN client executable to masquerade as legitimate Windows processes, specifically conhost.exe and dllhost.exe. By doing so, they attempt to blend in with normal system activity and evade detection. The group’s activity highlights a trend of leveraging legitimate tools for malicious purposes. This allows them to maintain a low profile and persist within compromised networks for extended periods. Defenders should be aware of this tactic and implement detections to identify SoftEther VPN processes running under unexpected names.
Attack Chain
- Initial compromise of a Taiwanese organization through unknown means.
- Deployment of SoftEther VPN client onto the compromised system.
- Renaming of the SoftEther VPN client executable to
conhost.exeordllhost.exe. - Execution of the renamed SoftEther VPN client to establish a VPN connection.
- Network traffic is routed through the SoftEther VPN, masking the origin of malicious activity.
- Lateral movement within the network using the VPN connection for obfuscation.
- Data exfiltration or other malicious activities, further concealed by the VPN.
- Maintaining persistence by ensuring the renamed VPN client automatically starts on system reboot, providing continuous obfuscation for their activities.
Impact
The successful deployment of this technique allows the Flax Typhoon group to operate within compromised networks with reduced visibility. By masquerading the VPN client as legitimate processes, they make it more difficult for defenders to identify and respond to malicious activity. This can lead to prolonged periods of undetected data theft, system compromise, and other harmful outcomes. While the exact number of victims is unknown, the targeting of Taiwanese organizations suggests a focused campaign with potentially significant impact on national security and economic interests.
Recommendation
- Implement the provided Sigma rule to detect SoftEther VPN binaries running under the names
conhost.exeordllhost.exein your SIEM (see rules). - Investigate any instances of
conhost.exeordllhost.exeprocesses with a company name containing “SoftEther” or an original filename matching “vpnbridge*.exe” (see rules). - Monitor process creation events (Event ID 1 in Sysmon) for unexpected executions of renamed binaries.
- Review network connection logs for outbound traffic originating from
conhost.exeordllhost.exeto external VPN servers, potentially indicating masqueraded SoftEther VPN activity.
Detection coverage 2
SoftEther VPN Masquerading as conhost.exe or dllhost.exe
mediumDetects SoftEther VPN client running as conhost.exe or dllhost.exe, a technique used by Flax Typhoon.
SoftEther VPN with vpnbridge Filename Masquerading
mediumDetects SoftEther VPN client using vpnbridge filename to hide its activity.
Detection queries are kept inside the platform. Get full rules →