Code Defence Cyber security

Volt Typhoon Hackers Found Lurking in US Power Grids for 6 Months

A joint advisory from CISA, NSA, and FBI confirms that the China-state-sponsored group “Volt Typhoon” has successfully infiltrated multiple US power grid operators and maintained undetected access for at least six months. They used “living off the land” techniques, leveraging legitimate admin tools to blend in.

Business Impact

This is a pre-positioning attack for potential future sabotage. The actors didn’t steal data but entrenched themselves deep within critical OT networks, giving them the capability to disrupt power supply during a future geopolitical crisis.

Why It Happened

The group exploited old, forgotten SOHO routers and VPN concentrators at the network edge to gain initial entry, then used stolen valid credentials to move laterally, avoiding malware that would trigger traditional EDR alerts.

Recommended Executive Action

Critical infrastructure leaders must mandate a “hunting forward” exercise. Assume standard detection has failed. Manually review account activity for legitimate tools (PowerShell, WMI) being used in unusual ways. Reset all privileged account credentials immediately.

Hashtags: #VoltTyphoon #CriticalInfrastructure #China #APT #CISA #EnergySector #CyberWarfare #InfoSec

Scroll to Top

Review My Order

0

Subtotal