Flax Typhoon

Flax Typhoon is a China-based cyber-espionage group that infiltrates organizations by exploiting public-facing services and using legitimate software to maintain stealthy, long-term access without relying on traditional malware.

Is Your Organization Safe From Flax Typhoon's Attacks?

The Origin of Flax Typhoon

Flax Typhoon is a China-based nation-state activity group that Microsoft has tracked since mid-2021. The actor focuses on long-term access and espionage, operating with minimal bespoke malware. Instead the group relies heavily on living-off-the-land binaries, legitimate third-party software, web shells, and hands-on-keyboard activity to quietly maintain presence in target networks. Microsoft attributes a campaign primarily against organizations in Taiwan to this group, though activity has been observed elsewhere.

Countries targeted by Flax Typhoon

The activity is concentrated in Taiwan, with some victims in Southeast Asia, North America, and Africa. The tooling and techniques are reusable and could be applied outside the region.

Industries targeted by Flax Typhoon

Flax Typhoon has primarily targeted government agencies, education, critical manufacturing, and information technology organizations. The campaign appears collection-oriented rather than disruptive, consistent with espionage objectives.

Flax Typhoon's Victims

Microsoft reported dozens of affected organizations; victims include internet-facing servers, VPN gateways, and servers running web, Java, and SQL services. Initial access commonly leverages public-facing services and web shells.

Attack Method

Flax Typhoon's Attack Method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

Exploits known vulnerabilities in public-facing applications and services to deploy web shells such as China Chopper.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

Uses public open-source privilege-escalation tools (Juicy Potato, BadPotato and variants) and known vulnerability exploits to elevate privileges on compromised hosts.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

Establishes long-term access by enabling RDP persistence, disabling Network Level Authentication (NLA), replacing accessibility binaries (Sticky Keys/sethc.exe), and installing/configuring a VPN client to tunnel traffic to actor infrastructure. Operates with legitimate accounts, uses LOLBins and signed system binaries (certutil, bitsadmin, etc.), and avoids heavy malware to reduce detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Dumps credentials and memory from LSASS using tools like Mimikatz and other credential-dumping techniques.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

Uses the established VPN tunnels and legitimate remote services to scan networks and move laterally.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Leverages built-in utilities and remote services to probe and access other systems.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

Executes commands and lightweight tools interactively, collects credentials and configuration information, and stages data for exfiltration via established tunnels or proxying hosts.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Microsoft did not observe broad destructive actions in this campaign; the activity appears focused on stealthy access and collection rather than sabotage.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

Exploits known vulnerabilities in public-facing applications and services to deploy web shells such as China Chopper.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

Uses public open-source privilege-escalation tools (Juicy Potato, BadPotato and variants) and known vulnerability exploits to elevate privileges on compromised hosts.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

Establishes long-term access by enabling RDP persistence, disabling Network Level Authentication (NLA), replacing accessibility binaries (Sticky Keys/sethc.exe), and installing/configuring a VPN client to tunnel traffic to actor infrastructure. Operates with legitimate accounts, uses LOLBins and signed system binaries (certutil, bitsadmin, etc.), and avoids heavy malware to reduce detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Dumps credentials and memory from LSASS using tools like Mimikatz and other credential-dumping techniques.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

Uses the established VPN tunnels and legitimate remote services to scan networks and move laterally.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Leverages built-in utilities and remote services to probe and access other systems.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

Executes commands and lightweight tools interactively, collects credentials and configuration information, and stages data for exfiltration via established tunnels or proxying hosts.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution
A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Microsoft did not observe broad destructive actions in this campaign; the activity appears focused on stealthy access and collection rather than sabotage.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact
MITRE ATT&CK Mapping

TTPs Used by Flax Typhoon

TA0001: Initial Access
T1190
Exploit Public-Facing Application
T1133
External Remote Services
TA0002: Execution
No items found.
TA0003: Persistence
T1505
Server Software Component
T1546
Event Triggered Execution
TA0004: Privilege Escalation
T1068
Exploitation for Privilege Escalation
T1546
Event Triggered Execution
TA0005: Defense Evasion
T1218
System Binary Proxy Execution
TA0006: Credential Access
T1003
OS Credential Dumping
TA0007: Discovery
No items found.
TA0008: Lateral Movement
No items found.
TA0009: Collection
No items found.
TA0011: Command and Control
No items found.
TA0010: Exfiltration
No items found.
TA0040: Impact
No items found.

FAQs

Is Flax Typhoon destructive ransomware or espionage-focused?

What makes detection difficult for this actor?

Which artifacts should be high priority when triaging a suspected compromise?

Are there published hunting queries or detection rules to use?

Should we block the IPs Microsoft listed?

How to prioritize remediation after detection?

What telemetry is most valuable for detecting this group?

Do standard AV products detect their tooling?

Any quick hardening checklist?

Where can I get the official details, hunting queries, and IOCs?