Volt Typhoon: Taking US Infrastructure by Storm

Volt Typhoon a state-sponsored cyber group originating from the People’s Republic of China, targets US critical infrastructure. Cybersecurity units in various agencies (CSIA, FBI, NCSC-UK and ACSC) report that the group employs advanced tactics. Their tactics include exploiting network vulnerabilities, leveraging known and zero-day exploits for initial access, using legitimate admin tools (LOTL techniques), as well as extracting Active Directory databases. Recent FBI disclosures reveal Volt Typhoon penetration in the US’s telecommunications, energy and water sectors signalling potential disruptions. Additionally, FBI director Christopher Wray warns of a “devastating blow” to national security, noting that 23 pipeline operators were targeted. Despite China denying government interference, private sector cyber security experts like Microsoft and Google support suspicions of state-sponsored cyber aggression. 

Key Judgement 1. Volt Typhoon’s use of advanced tactics will increase the frequency and sophistication of future cyber attacks on U.S. critical infrastructure.

Key Judgement 2. It is highly likely that Volt Typhoon’s infiltration of critical sectors like telecommunications, will allow them to collect critical information that has implications for US national security. 

Key Judgement 3. The US inter-agency response from cyber security teams will likely lead towards stronger cybersecurity measures against state-sponsored groups.  

Rest of this post is for paying members only

Already have an account?  Log in

Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Table of Contents

Related Content

Secret

Fact-Checking Rollback: Implications for Propaganda, Extremism, Misinformation

Location:_ North America
Secret

AI-Driven Cyber Threats: Risks and Challenges in the Digital Age

Location:_ North America
Secret

Spy Technology: Benefits for Mankind

Location:_ North America
Secret

China’s Chilean Observatory: Science or Subterfuge?

Location:_ Latin America
Secret

3D Printed Ghost Guns: Tracing Tomorrow’s Problem Today

Secret

Post-Quantum Cryptography: Are We There Yet?

Stay in the loop

Get a free weekly email that makes reading intel articles and reports actually enjoyable.

Log in

Stay in the loop

Get a free weekly email that makes reading Intelligence Reports and Articles actually enjoyable.

Table of Contents

Contact

Contact

"*" indicates required fields

This field is for validation purposes and should be left unchanged.