Valtik Studios
Back to blog
APTcriticalUpdated 2026-04-17orig. 2026-02-1711 min

Volt Typhoon: The Chinese APT Already Inside US Critical Infrastructure

Volt Typhoon is a Chinese state-sponsored APT that has pre-positioned on US critical infrastructure networks. Water treatment, electrical grid, telecommunications. For years. Their strategy isn't espionage in the traditional sense. It's preparation to disrupt civilian systems at the moment of a geopolitical crisis. A deep dive into what the group is, what they've achieved, and what defenders should be doing.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

What makes Volt Typhoon different

Most Chinese state activity we tracked through the 2010s and early 2020s was about IP theft. F-35 specs. Satellite engineering. Pharmaceutical research. The goal was to copy what the West had built.

Volt Typhoon is different. The goal isn't to copy anything. The goal is to sit inside US critical infrastructure networks and wait. Water utilities, energy grid, telecommunications, transportation. Pre-positioned footholds ready to be activated if Beijing decides it needs to disrupt civilian services. That's not cyber espionage. That's the cyber equivalent of putting submarines under Virginia Beach.

This post covers what CISA and allied governments have published about the group, how they operate, and what critical-infrastructure defenders should actually be doing right now.

What Volt Typhoon is

Volt Typhoon. Also tracked as Bronze Silhouette (by Secureworks), VANGUARD PANDA (by CrowdStrike), and BRONZE PANDA-ADJACENT in some Mandiant reporting. Chinese state-sponsored advanced persistent threat group. Active since at least 2021, possibly earlier.

Unlike most Chinese state activity targeting the US, which focuses on intellectual property theft, government espionage. And supply chain intelligence, Volt Typhoon's mission is different and more alarming. The group is actively pre-positioning on US critical infrastructure networks. Water utilities, energy providers, telecommunications, transportation systems. With the apparent goal of maintaining persistent access that could be used to disrupt civilian services at a moment of geopolitical choosing.

In February 2024, a joint advisory from CISA, the NSA, the FBI. And multiple allied governments explicitly stated that Volt Typhoon had "compromised IT environments across multiple critical infrastructure sectors" and that the group's activity "isn't consistent with traditional cyber espionage or intelligence gathering operations". Meaning it's not about stealing secrets, it's about holding footholds.

This post covers what Volt Typhoon has done, how they operate, what CISA and other agencies have published about their tradecraft. And what critical-infrastructure defenders should be doing right now.

Why this matters

Most nation-state cyber activity falls into well-understood categories. Russia does information operations and destructive attacks timed to kinetic conflicts (Ukraine 2022, Estonia 2007). Iran does opportunistic destruction (Shamoon/Saudi Aramco, various banking sector attacks). North Korea does financially motivated crime (Lazarus, DeFi exploits). Chinese APTs traditionally do IP theft and espionage (APT10, APT40, APT41 in their IP-theft capacity).

Volt Typhoon is different. The best public assessment. From US intelligence community statements, CISA advisories, and private-sector threat intel reports. Is that Volt Typhoon is preparing to disrupt civilian infrastructure during a future China-US conflict, most likely centered on Taiwan. The scenario: China initiates military action against Taiwan. The US responds; Volt Typhoon uses its existing access to disrupt US water systems, power grids, telecommunications. And transportation to impose domestic costs on the US response.

This changes the defensive calculus. Traditional APT defense focuses on detecting and evicting intruders before they can exfiltrate sensitive data. Volt Typhoon isn't trying to exfiltrate. They're trying to stay in, as quietly as possible, for as long as possible, ready to act when directed.

The defensive problem is harder because there's no exfiltration to detect. The indicator of compromise is the pre-positioning itself. Persistent access, credential staging, living-off-the-land techniques that look like legitimate administrator activity.

The targets

Per CISA's joint advisory and subsequent reporting, Volt Typhoon has targeted:

  • Electric utilities in the continental US and Guam
  • Water and wastewater treatment facilities
  • Telecommunications providers. Both mainstream carriers and regional ISPs
  • Transportation systems including rail and aviation IT
  • Emergency services communications systems
  • Manufacturing with critical-infrastructure overlap

The geographic focus on Guam is particularly notable. Guam hosts substantial US military infrastructure and would be central to any US response to a Taiwan conflict. Compromising Guam's civilian infrastructure creates force-multiplier disruption to military operations there.

Sector-specific targeting includes:

Water utilities. Smaller municipal water treatment facilities are particularly exposed. Many run legacy SCADA/ICS environments with minimal security investment. Volt Typhoon has been observed in the IT-OT bridge layer. The interconnection between corporate networks and operational technology.

Energy. Electrical grid operators, both regulated utilities and independent producers. Focus on the SCADA systems controlling grid operations than customer billing or administrative systems.

Telecommunications. This overlaps with Salt Typhoon (a separate Chinese APT focused on signals intelligence and lawful-intercept system compromise), but Volt Typhoon's telecom targeting appears more disruption-oriented.

How Volt Typhoon operates

The group's tradecraft is notably disciplined. Public CISA and private-sector analyses converge on the following pattern:

1. Initial access via vulnerable edge devices

Volt Typhoon heavily favors edge devices. SOHO routers, VPN appliances, firewalls, load balancers. As initial access points. They exploit known vulnerabilities (often CVEs that are months to years old but unpatched on edge devices) in products from:

  • Fortinet (multiple FortiGate and FortiClient CVEs)
  • Cisco IOS and ASA
  • Netgear, DrayTek, ASUS, D-Link home and small-business routers
  • Pulse Secure / Ivanti Connect Secure
  • SonicWall
  • Citrix

The strategic logic: edge devices are often unmanaged, unpatched, and logging-sparse. They also typically bridge the internet and internal networks, giving an initial foothold that's hard to detect and remove.

2. Living-off-the-land for lateral movement

Once inside, Volt Typhoon avoids custom malware. Instead they use native Windows utilities (PowerShell, WMIC, netsh, certutil, ntdsutil) and standard admin tools (PsExec, RDP, WinRM, scheduled tasks). This tradecraft is known as "living off the land" because attackers live on the tools already present than bringing their own.

Why it works: living-off-the-land activity is extremely difficult to distinguish from legitimate administration. A systems administrator running wmic and netsh on Tuesday morning doesn't look suspicious. Volt Typhoon operators running the same tools on Tuesday morning don't either.

Specific techniques documented by CISA:

  • certutil.exe -urlcache -split -f for staging downloads
  • wmic.exe for remote command execution
  • reg.exe save to extract registry hives containing credentials
  • ntdsutil to extract Active Directory database offline
  • cmd.exe /c with piped PowerShell for obfuscated command execution
  • Scheduled tasks for persistence

3. Credential harvesting and privilege escalation

Volt Typhoon extracts credentials aggressively. LSASS memory dumps, SAM database extraction, NTDS.dit extraction. Once domain admin credentials are obtained, the group maps the entire environment.

4. Persistence through stolen credentials

Rather than installing backdoors, Volt Typhoon prefers to maintain access via stolen valid credentials. They rotate among multiple accounts to avoid any single account's compromise being detected. They compromise accounts with VPN access, RDP access, and cloud admin privileges.

This makes eviction difficult. A defender who identifies compromise and rotates one set of credentials may not close all the access paths if the attackers have established multiple credential footholds.

5. Minimal exfiltration

Volt Typhoon rarely exfiltrates large volumes of data. Small amounts of reconnaissance information. Network maps, credential databases, system configurations. Are collected, but not the wholesale data-theft that characterizes Chinese IP-theft operations. This is one of the strongest indicators the group's purpose is pre-positioning, not intelligence collection.

6. Targeting of ICS / OT assets

Where reachable, Volt Typhoon moves from IT into OT environments. Public reporting has noted the group has compromised engineering workstations, HMI systems. And in some cases controller-level devices in operational technology networks. Direct OT access is the capability that enables disruption. Turning off a pump, misconfiguring a switch, altering a setpoint.

What CISA wants defenders to do

CISA's advisories and guidance for critical infrastructure defenders have been unusually specific. The key recommendations:

1. Assume you may already be compromised

CISA has explicitly stated that organizations in affected sectors shouldn't assume absence of compromise because they haven't detected any. Volt Typhoon's tradecraft is specifically designed to evade detection. A threat hunt looking specifically for living-off-the-land patterns is the recommended posture.

2. Hunt specifically for the documented TTPs

CISA has published detailed indicators of compromise including specific command-line patterns, registry key locations, scheduled task names. And authentication anomalies. Every critical infrastructure defender should run hunts for these IOCs. Products like CrowdStrike, Microsoft Defender for Endpoint, and SentinelOne have detection rules specifically tuned to Volt Typhoon TTPs. Ensure they're enabled and tuned.

3. Patch edge devices immediately

The single highest-value defensive action. Edge device patching cadence at most critical infrastructure organizations is inadequate. Fix it:

  • Inventory every edge device (firewalls, VPN, load balancers, SOHO routers in branch offices)
  • Subscribe to vendor security advisories
  • Patch within 30 days of advisory release, not 6+ months
  • Replace unpatchable devices (end-of-life hardware) on an accelerated schedule

4. Enforce MFA everywhere, especially for VPN and remote access

Volt Typhoon relies heavily on stolen credentials. MFA. Particularly hardware-key MFA. Substantially raises the attack cost. Many critical infrastructure organizations still have VPN access that accepts password-only authentication or SMS-based MFA. This is no longer acceptable.

5. Network segmentation between IT and OT

The IT-OT bridge is Volt Typhoon's primary escalation path. Organizations that maintain rigorous network segmentation (with properly-configured firewalls, unidirectional gateways where appropriate. And strict access controls between layers) substantially limit the blast radius.

Effective segmentation requires:

  • Physical or logical separation between IT corporate networks and OT control networks
  • Traffic inspection and allowlisting between zones
  • Jump hosts that are hardened and monitored
  • No direct internet access from OT networks

Many critical infrastructure organizations still have flat networks where IT compromise rapidly escalates to OT reach. This is the single biggest structural defense gap.

6. Audit log collection and SIEM coverage

Living-off-the-land is detectable if you've the logs. Required logs:

  • Process execution (via Sysmon or equivalent)
  • PowerShell script block logging
  • Windows Event Log collection (Security, System, Application)
  • Firewall logs
  • VPN authentication logs
  • Active Directory authentication events
  • OT-specific logs where available

These logs need to flow to a SIEM where they can be correlated. Many critical infrastructure organizations have log collection but no correlation. Effectively unusable for detection of APT activity.

7. Supply chain vigilance

Volt Typhoon has been observed using compromised supplier access as an entry vector. Managed service providers, vendors with remote access, and third parties with VPN credentials are all potential entry paths. Vendor risk management needs to include ongoing monitoring of vendor authentication patterns, not annual questionnaires.

8. Tabletop the disruption scenario

Most critical infrastructure IR plans assume the attacker's goal is ransom, data theft, or brief operational disruption. Volt Typhoon's goal is different: coordinated multi-sector disruption during a geopolitical crisis. Tabletop exercises should include:

  • Simultaneous compromise of multiple systems (not isolated attack)
  • Pre-positioned access that activates on external trigger (not gradual encroachment)
  • Coordination with peer organizations in the same sector
  • Government partnership activation (CISA, sector ISACs)
  • Media and public communication response

The broader strategic context

Volt Typhoon exists within a larger Chinese cyber operations apparatus that includes:

  • APT40 and related naval-affiliated groups (South China Sea intelligence)
  • APT41 (both espionage and financially-motivated operations)
  • APT1 / Comment Crew (classical IP theft)
  • Salt Typhoon (telecommunications sigint)
  • Bronze Silhouette / Volt Typhoon (critical infrastructure pre-positioning)

The division of labor suggests significant resource investment. Volt Typhoon's activities are costly. Maintaining persistent access across dozens of victim environments, operating with discipline to avoid detection, dedicating human analysts to ongoing operations. This isn't a budget-constrained operation.

The implication: Chinese leadership considers pre-positioned critical infrastructure access strategically important enough to invest significant national resources in maintaining. This is unlikely to be abandoned absent major geopolitical change.

For critical infrastructure CISOs

If you run security at a water utility, energy company, telecommunications provider, transportation system, or manufacturer with critical infrastructure dependencies, the Volt Typhoon threat isn't hypothetical. You're in the target set.

The questions to answer in the next quarter:

  1. Have we conducted a threat hunt specifically targeting Volt Typhoon TTPs? Not a routine incident response. A dedicated, multi-week threat hunt using CISA's published IOCs and patterns. If not, schedule one.

  1. Is our edge device inventory complete and current? Every router, firewall, VPN, load balancer. And edge-IoT device should be documented, patched, and monitored.

  1. Is our IT-OT segmentation adequate? Can a compromise of your corporate email accelerate to compromise of your OT controllers within a day, a week, a month? The right answer is "not feasibly."

  1. Do we've sufficient log coverage to detect living-off-the-land activity? Process execution, PowerShell, authentication events. All flowing to a SIEM where correlation can happen.

  1. Have we rehearsed the strategic-disruption scenario? Not a ransomware tabletop. A "state actor activates pre-positioned access during a Taiwan crisis" tabletop.

  1. Are we engaged with our sector ISAC and CISA? Water-ISAC, E-ISAC, Comms-ISAC, etc. Information-sharing during active state-actor operations is critical.

For regional and mid-size utilities

Smaller critical infrastructure operators. Municipal water systems, small electric co-ops, regional telecoms. Face the same threat with fewer resources. CISA's Cyber Performance Goals (CPGs) provide a baseline tailored for smaller operators. Start there.

For organizations genuinely concerned about Volt Typhoon but lacking internal resources, consider:

  • Engaging a Managed Detection and Response (MDR) provider with APT hunt capability
  • Requesting a CISA Cyber Resilience Review (free)
  • Joining your sector ISAC
  • Contracting a third-party threat-hunt engagement periodically (quarterly or semi-annually)

The most dangerous posture is assuming that because you're smaller, you're not a target. Volt Typhoon's strategy requires compromising many infrastructure organizations to achieve the coordinated-disruption effect. Smaller, less-defended targets may be preferentially compromised because the ratio of access-value to operational-cost is favorable.

What Valtik does in this space

Valtik Studios provides threat hunt engagements tailored to critical infrastructure organizations. Our critical-infrastructure-focused engagements include:

  • APT-focused threat hunts specifically covering Volt Typhoon / Bronze Silhouette TTPs
  • IT-OT segmentation review including architectural assessment and recommended hardening
  • Edge device security audits for routers, firewalls, and VPN appliances
  • Tabletop exercises simulating state-actor strategic-disruption scenarios
  • Incident response planning for the disruption-oriented threat model

If you run security at a water utility, small-to-mid-size electric operator, regional telecom, or any critical infrastructure adjacent organization in Connecticut, Massachusetts, or the Dallas / Fort Worth region, reach out via https://valtikstudios.com. We can discuss scoping a threat-hunt engagement appropriate to your size.

Sources

  1. CISA Advisory AA24-038A. PRC State-Sponsored Actors Compromise and Maintain Persistent Access
  2. CISA Joint Cybersecurity Advisory. Volt Typhoon Living-Off-The-Land Techniques
  3. NSA / CISA Cyber Performance Goals
  4. Microsoft Threat Intelligence. Volt Typhoon
  5. Secureworks Bronze Silhouette Analysis
  6. CrowdStrike VANGUARD PANDA Analysis
  7. Mandiant / Google Cloud Chinese APT Reporting
  8. FBI 2024 Congressional Testimony on Volt Typhoon
  9. Water-ISAC Threat Briefings
  10. Electricity ISAC (E-ISAC)
volt typhoonchinese aptthreat intelligencecritical infrastructurenation-stateliving off the landcisaincident responseresearch

Want us to check your APT setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.