A joint advisory from CISA, NSA, and FBI confirms that the China-state-sponsored group “Volt Typhoon” has successfully infiltrated multiple US power grid operators and maintained undetected access for at least six months. They used “living off the land” techniques, leveraging legitimate admin tools to blend in.
Business Impact
This is a pre-positioning attack for potential future sabotage. The actors didn’t steal data but entrenched themselves deep within critical OT networks, giving them the capability to disrupt power supply during a future geopolitical crisis.
Why It Happened
The group exploited old, forgotten SOHO routers and VPN concentrators at the network edge to gain initial entry, then used stolen valid credentials to move laterally, avoiding malware that would trigger traditional EDR alerts.
Recommended Executive Action
Critical infrastructure leaders must mandate a “hunting forward” exercise. Assume standard detection has failed. Manually review account activity for legitimate tools (PowerShell, WMI) being used in unusual ways. Reset all privileged account credentials immediately.
Hashtags: #VoltTyphoon #CriticalInfrastructure #China #APT #CISA #EnergySector #CyberWarfare #InfoSec
