Yeah.
Also, Microsoft suggests enforcing strong multi-factor authentication (MFA) policies, hardening
LSASS processes, and running endpoint detection and response (EDR) in block mode to protect against such stealthy attacks.
They are one of the most "Stealthy" cyber crime groups operating online, in my opinion, since they also carefully
deleted and wiped out the evidence and proof of intrusions from the victim's logs. A lot of human talent is actually being wasted on such clever and nefarious activities.
Some say using Passwordless sign-in, password expiration rules, and deactivating unused accounts can also help mitigate this attack/risk, but I doubt this is also going to work that easily.
Because this hacker group also uses the "Windows Management Instrumentation Command-line" and the ping command to discover other systems on the network, apart from the command-line tool
Ntdsutil.exe, and also PowerShell.
MS and CISCO actually gave some code snippets as examples. One of these, show the commands used by Volt Typhoon when setting up and removing a port proxy on an infiltrated system.