ANALYTICAL BRIEFREF: VTPH-0326-GE|SOURCE: OSINT / CISA ADVISORIES / FBI STATEMENTS / MICROSOFT THREAT INTELLIGENCE
UPDATED 16 MAR 2026
VOLT TYPHOON

THE SLEEPER NETWORK

How China Pre-Positioned Inside American Water, Power, and Telecom Systems — and Why the Kill Switch Is the Point

SUBJECT PRC State-Sponsored Cyber Pre-Positioning
REGION United States / Guam / Five Eyes
PRIORITY CRITICAL
ANALYST OPEN SOURCE
STATUS ACTIVE THREAT
MAY 2023 — Microsoft identifies Volt Typhoon; CISA confirms compromise of US critical infrastructure sectors ///JAN 2024 — FBI Director Wray: "This threat is not theoretical." Court-authorized operation removes malware from compromised routers ///FEB 2024 — CISA: Volt Typhoon maintained access to some US critical infrastructure for "at least five years" ///JUN 2024 — Singapore telecom Singtel breached by Volt Typhoon ///FEB 2026 — Dragos: Volt Typhoon correlated group still active in US energy networks, 3 new OT-focused threat groups identified ///NOV 2025 — Australian intelligence confirms Chinese government hackers probing Australian critical infrastructure ///MAY 2023 — Microsoft identifies Volt Typhoon; CISA confirms compromise of US critical infrastructure sectors ///JAN 2024 — FBI Director Wray: "This threat is not theoretical." Court-authorized operation removes malware from compromised routers ///FEB 2024 — CISA: Volt Typhoon maintained access to some US critical infrastructure for "at least five years" ///JUN 2024 — Singapore telecom Singtel breached by Volt Typhoon ///FEB 2026 — Dragos: Volt Typhoon correlated group still active in US energy networks, 3 new OT-focused threat groups identified ///NOV 2025 — Australian intelligence confirms Chinese government hackers probing Australian critical infrastructure ///

THE INFRASTRUCTURE IS ALREADY COMPROMISED

WASHINGTON, D.C. — 7 FEBRUARY 2024 | CISA / NSA / FBI JOINT ADVISORY

Five Eyes Agencies Confirm Chinese Hackers Embedded in US Critical Infrastructure for Five Years

On February 7, 2024, CISA, NSA, FBI, and their Five Eyes counterparts issued a joint advisory confirming that Volt Typhoon — a People's Republic of China state-sponsored cyber group — had maintained persistent access to multiple U.S. critical infrastructure networks for at least five years.[1] The compromised sectors included water treatment, power generation, oil and gas pipelines, transportation systems, and telecommunications.[2]

FBI Director Christopher Wray was unequivocal: "China's hackers are positioning on American infrastructure in preparation to wreak havoc and cause real-world harm to American citizens and communities."[2] CISA Director Jen Easterly added: "This threat is not theoretical. CISA teams have found and eradicated Chinese intrusions into critical infrastructure across multiple sectors, and what we've found to date is likely the tip of the iceberg."[3]

DWELL TIME
5+ years
Persistent access maintained since at least 2019 in some networks[1]
SECTORS HIT
6+
Water, power, gas, telecom, transportation, maritime — confirmed compromised[2]
BOTNET NODES
Hundreds
Compromised SOHO routers used as proxy infrastructure, disrupted by FBI Jan 2024[4]

China's hackers are positioning on American infrastructure in preparation to wreak havoc and cause real-world harm to American citizens and communities.

— FBI Director Christopher Wray, Congressional testimony, January 2024[2]

LIVING OFF THE LAND

Volt Typhoon's operational security is exceptional — and deliberate. Unlike conventional APTs that deploy custom malware, Volt Typhoon almost exclusively uses built-in Windows administration tools: PowerShell, WMI, netsh, ntdsutil.[5] This technique — "living off the land" — means their activity is nearly indistinguishable from legitimate system administration. No malware signatures to detect. No anomalous binaries to flag. Just native commands executed by apparently authorized users.

The group routes traffic through compromised small office and home office (SOHO) routers, firewalls, and VPN hardware — converting the everyday networking equipment of American homes and small businesses into a proxy infrastructure for espionage.[5] In January 2024, the FBI conducted court-authorized operations to remove Volt Typhoon malware from hundreds of compromised U.S. routers, disrupting the botnet they used to mask their origin.[4]

Secureworks assessed that Volt Typhoon's obsessive operational security "likely stemmed from embarrassment over the drumbeat of US indictments [of Chinese state-backed hackers] and increased pressure from Chinese leadership to avoid public scrutiny."[6] But the operational security serves a dual purpose: it also ensures the access survives discovery. According to cybersecurity researcher Ryan Sherstobitoff: "Unlike attackers who vanish when discovered, this adversary digs in even deeper when exposed."[7]

PRE-POSITIONING FOR TAIWAN

The U.S. intelligence community assesses that Volt Typhoon's purpose is not espionage in the traditional sense. The group is not exfiltrating classified documents or stealing intellectual property. It is pre-positioning destructive capability inside infrastructure that would be critical during a Taiwan contingency.[1]

Microsoft's original May 2023 analysis concluded that Volt Typhoon's campaigns "prioritize capabilities which enable China to sabotage critical communications infrastructure between the US and Asia during potential future crises."[5] The geographic targeting supports this: Guam — the forward staging base for any U.S. Pacific military response — was among the first confirmed targets.[5]

The logic is grimly elegant. If the PLA moves on Taiwan, the United States mobilizes. That mobilization depends on communications, power, water, fuel, and transportation networks functioning normally. If those networks are simultaneously disrupted — water treatment plants shut down, power grids destabilized, pipeline SCADA systems manipulated, telecom networks degraded — the mobilization slows. Military logistics collapse. Public panic diverts government attention. And the window for a fait accompli in the Taiwan Strait widens.

This is not a cyberattack. It is a pre-installed kill switch — dormant until the moment it provides maximum strategic leverage.

THE TIP OF THE ICEBERG

FINDING 01 // WATER & WASTEWATER

Multiple water treatment facilities compromised. Manipulation of water treatment SCADA systems could contaminate municipal water supplies or disable treatment processes. The operational technology (OT) environments in these facilities are notoriously under-secured — many run decades-old industrial control systems never designed for network connectivity.[2]

FINDING 02 // ENERGY & POWER GRID

Electric utilities and oil/gas pipeline operators confirmed compromised. In February 2026, Dragos reported that Voltzite — the group "highly correlated" with Volt Typhoon — remained active in U.S. energy networks, with 11 of 26 tracked OT-focused threat groups active in 2025.[8] Three new OT-focused groups were identified in the same period.

FINDING 03 // TELECOMMUNICATIONS

In June 2024, Singapore's Singtel — a major regional telecom — was breached by Volt Typhoon.[9] In November 2025, Australian intelligence confirmed Chinese government hackers had probed Australian telecommunications networks, identifying both Volt Typhoon and the related group Salt Typhoon.[10] The campaign extends well beyond U.S. borders.

FINDING 04 // TRANSPORTATION & MARITIME

Transportation systems including maritime ports and logistics networks confirmed in the target set.[2] Disruption of port operations and logistics during a military mobilization would compound the effects of energy and communications disruption — a cascading failure designed to paralyze the entire mobilization chain.

NOT ONE GROUP — A CAMPAIGN

Volt Typhoon does not operate in isolation. U.S. intelligence has identified multiple PRC-linked groups targeting critical infrastructure in a coordinated campaign, each with distinct tactics and targets:

Salt Typhoon targeted U.S. telecommunications providers including AT&T, Verizon, and T-Mobile, intercepting real-time communications and accessing lawful intercept systems — the same wiretapping infrastructure used by U.S. law enforcement. This means Chinese intelligence potentially had access to the communications of targets under active FBI surveillance.[10]

Flax Typhoon operated a botnet of compromised IoT devices — cameras, routers, NAS devices — used as proxy infrastructure across Taiwan and the broader Indo-Pacific. The FBI disrupted this botnet in September 2024.[4]

The pattern is clear: these are not independent hacking groups pursuing separate objectives. They are components of a unified pre-positioning campaign, each preparing a different layer of infrastructure disruption capability for activation during a potential Taiwan conflict.

FIVE YEARS OF ACCESS

2019 OR EARLIER
Volt Typhoon begins compromising U.S. critical infrastructure networks. Dwell time of at least five years confirmed by CISA in 2024 advisory.[1]
MID-2021
Microsoft begins tracking the group as Dev-0391/Storm-0391. Activity focuses on Guam and critical infrastructure in the continental U.S.[5]
MAY 2023
Microsoft publicly identifies Volt Typhoon. CISA, NSA, FBI, and Five Eyes partners issue joint advisory confirming compromise of U.S. critical infrastructure sectors.[5][3]
JANUARY 2024
FBI Director Wray testifies before Congress: "China's hackers are positioning on American infrastructure in preparation to wreak havoc." FBI conducts court-authorized operation to disrupt Volt Typhoon botnet — removes malware from hundreds of compromised routers.[2][4]
FEBRUARY 2024
CISA issues updated advisory: Volt Typhoon maintained access to some critical infrastructure for "at least five years." Advisory details living-off-the-land techniques and provides detection guidance.[1]
JUNE 2024
Singapore telecom Singtel breached by Volt Typhoon — confirming the campaign extends beyond U.S. borders to allied communications infrastructure.[9]
NOVEMBER 2025
Australian intelligence director-general Mike Burgess confirms Chinese government hackers probed Australian critical infrastructure including telecommunications. Names both Volt Typhoon and Salt Typhoon.[10]
FEBRUARY 2026
Dragos annual report: Voltzite (correlated with Volt Typhoon) remains active in U.S. energy networks. Three new OT-focused threat groups identified. Total worldwide: 26 groups, 11 active in 2025.[8]

BOTTOM LINE

Volt Typhoon represents a fundamental shift in how nation-states prepare for conflict. This is not intelligence collection. It is not espionage. It is the pre-installation of destructive capability inside an adversary's civilian infrastructure, designed to activate at the moment of maximum strategic impact.[1]

The tradecraft — living off the land, routing through SOHO devices, avoiding custom malware — is optimized not for data theft but for persistence. The goal is to be inside the network when the order comes, not to extract value in peacetime. Five years of access with no exfiltration is not patience. It is pre-positioning.[5]

The strategic connection to Taiwan is assessed with high confidence by the U.S. intelligence community. Every compromised water plant, power grid, and telecom network is a node in a distributed denial-of-service attack against American society itself — timed to coincide with the moment the U.S. military needs that society functioning at full capacity.[1]

Operation Absolute Resolve demonstrated what CYBERCOM can do to an adversary's infrastructure offensively. Volt Typhoon is the mirror image: what China has already done to American infrastructure, waiting to be activated. The asymmetry is that the U.S. demonstrated its capability publicly. China's capability is designed to remain invisible until the moment it isn't.

Unlike attackers who vanish when discovered, this adversary digs in even deeper when exposed.

— Ryan Sherstobitoff, cybersecurity researcher[7]

References & Source Material

  1. [1]CISA, NSA, FBI, "PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure," Joint Advisory AA24-038A, 7 Feb 2024
  2. [2]FBI, "Wray: Chinese Government Poses 'Broad and Unrelenting' Threat to U.S. Critical Infrastructure," 19 Apr 2024. Congressional testimony and infrastructure targeting details.
  3. [3]CISA, NSA, FVEY, "People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection," Joint Advisory AA23-144A, 24 May 2023
  4. [4]CNBC, "FBI shuts down China's 'Volt Typhoon' hackers targeting U.S. infrastructure," 31 Jan 2024. FBI botnet disruption, router malware removal.
  5. [5]Microsoft Threat Intelligence, "Volt Typhoon targets US critical infrastructure with living-off-the-land techniques," 24 May 2023. Original identification, tradecraft analysis, Guam targeting.
  6. [6]Secureworks, "BRONZE SILHOUETTE Targets the U.S. Defense Industrial Base," Threat Profile. Operational security assessment.
  7. [7]The Register, "China-linked crew embedded in US energy networks," 17 Feb 2026. Dragos annual report, Voltzite activity, new OT threat groups.
  8. [8]Dragos, "2025 OT Cybersecurity Year in Review," Feb 2026. 26 threat groups tracked, 11 active, Voltzite correlation with Volt Typhoon.
  9. [9]Bloomberg News / Singtel, "Singapore Singtel breached by Volt Typhoon," Nov 2024. Singtel confirmed malware eradicated.
  10. [10]"Volt Typhoon," Wikipedia. Comprehensive timeline, naming conventions, Five Eyes attribution, Australian intelligence confirmation.
CONNECTIONS
ZOOM OUT