Intentionally desktop-first — best experienced on a workstation
Portfolio
Investigative Threat Analysis · Nation-State · Critical Infrastructure

Volt Typhoon — China's
Silent War Inside America's Infrastructure

Author
Yana Ivanov
Published
March 14, 2026
Classification
Public — For Educational Use
Threat Actor
Volt Typhoon / Voltzite (PRC)
Active Since
2021 — Ongoing
Severity
Critical — Nation-State / Pre-War
Ongoing operation  ·  Critical infrastructure compromised  ·  Some footholds will never be found  ·  Analysis current as of March 14, 2026
Section 01

Executive Summary

Since at least 2021, a Chinese state-sponsored threat group designated Volt Typhoon — also tracked as Voltzite, Bronze Silhouette, and Vanguard Panda — has been methodically embedding itself inside the most critical infrastructure in the United States. Power grids. Water systems. Transportation networks. Communications. Military support facilities. Not to steal data. Not to demand ransom. Not to make noise. To wait.

This is not espionage in the traditional sense. The US Intelligence Community assesses with high confidence that Volt Typhoon's objective is pre-positioning — gaining persistent access to infrastructure that can be disabled or destroyed at a moment of their choosing, specifically in the event of military conflict over Taiwan. They are not looking through windows. They are installing the charges on the load-bearing walls.

Defining Assessment: Dragos CEO Rob Lee stated publicly in February 2026 that there are sites compromised by Volt Typhoon in the United States and NATO countries that "we will never find." The FBI Director called it preparation to "cause real-world harm to American citizens and communities in the event of conflict." The Air Force cyber commander said if those capabilities are activated during a Taiwan crisis, "that is total war in my definition."

This analysis examines how Volt Typhoon achieved five years of undetected persistence, why the obvious remediation steps fail, where the true investigation must begin, and what the policy failure at the heart of this crisis actually is. It is written from the perspective of a security analyst and CMMC consultant who works directly with the defense industrial base in Connecticut — the supply chain that builds the submarines, aircraft engines, and helicopters that would respond to a Taiwan conflict.

public Figure 1 — Scale and Scope of Volt Typhoon Operations
schedule
5+
Years Active
Persistent access since at least 2021 — still ongoing in 2026
corporate_fare
9+
Sectors Targeted
Energy · Water · Transport · Comms · Maritime · Gov · IT · Manufacturing · Defense
bolt
300
Days in Electric Grid
Confirmed dwell time in one US utility alone — Dragos confirmed 2025
search_off
Some Sites Never Found
Dragos CEO: footholds in US and NATO countries "we will never find"
CISA · NSA · FBI · Dragos · Microsoft Threat Intelligence — all confirm active ongoing operation as of March 2026
Section 02

Who Is Volt Typhoon — Attribution and Strategic Context

Volt Typhoon is a People's Republic of China state-sponsored threat actor assessed by CISA, NSA, FBI, and the Five Eyes intelligence alliance to be operating on behalf of the Chinese government — most likely the People's Liberation Army or the Ministry of State Security. Unlike Chinese APT groups focused on intellectual property theft, Volt Typhoon's targeting pattern is inconsistent with traditional espionage. They target infrastructure with minimal intelligence value but maximum disruption potential.

The Taiwan Trigger — Why This Exists

The strategic logic was confirmed at a December 2024 Geneva summit between Chinese and American officials where Chinese representatives made indirect but unmistakable remarks the US delegation interpreted as a tacit admission — the Volt Typhoon campaign was conducted in response to US support for Taiwan, as a warning about the cost of military intervention in a Taiwan conflict.

Strategic Assessment: China does not need to attack US infrastructure today. They need the US to know that if things go badly over Taiwan, the lights could go out in American cities, water treatment fails, communications collapse, and port operations freeze — all simultaneously, within hours, before US forces can mobilize. It is deterrence through pre-positioned destruction. The cyber equivalent of pointing a loaded weapon at civilian infrastructure to change political decision-making without pulling the trigger.

AliasAssigned ByAssessment
Volt TyphoonMicrosoftPrimary designation — PRC state-sponsored, critical infrastructure focus
VoltziteDragosOT-focused tracking — confirmed still active through 2025 and 2026
Bronze SilhouetteSecureworksLong-term persistence specialist — pre-positioning for disruption
Insidious TaurusCrowdStrikeAssessed PLA or MSS affiliation — Taiwan contingency focus
UNC3236MandiantLiving-off-the-land specialist — minimal malware footprint
account_tree Figure 2 — Strategic Logic: Pre-Positioning as Deterrence
outlined_flag
PRC / PLA — Strategic Objective
Deter US military intervention in any Taiwan conflict without firing a single shot. The capability itself — not its activation — is the weapon.
login
Pre-Position — Embed Access
Infiltrate US power, water, communications, ports, and defense supply chain — quietly, over years. No noise. No data theft. Just presence.
pending
Wait — Geopolitical Trigger
Taiwan crisis. US military mobilization. The moment the access is needed — it's already there, tested, verified, ready.
fork_right
Branch Point — Deter or Destroy
If US stands down: access never activated. If not: grid down, water fails, ports freeze, communications collapse — simultaneously, within hours.
Phase 1: Embed quietly for years — Phase 2: Either deter or destroy on command
Section 03

Five Years Undetected — How They Did It

The single most important question about Volt Typhoon is the one most analysts have not answered satisfactorily: how does a nation-state threat actor operate inside US critical infrastructure for five-plus years without being detected? The answer operates at three levels — technical, architectural, and human — and each one alone would be insufficient. Together they created a near-perfect cloak.

Level 1 — Living Off The Land: No Malware to Find

Traditional security tools — antivirus, endpoint detection, intrusion detection systems — all work on the same fundamental principle: they look for things that should not be there. Malicious files. Known bad signatures. Suspicious executables. Volt Typhoon brought none of those. They used only tools already installed on every Windows system in the country.

The LOTL Principle: When a Volt Typhoon operator ran netstat -ano to map active network connections, that command is identical to what your IT administrator runs on Tuesday morning. When they used PowerShell to query Windows Event Logs, that is identical to what your security team does during normal operations. When they used vssadmin to create a shadow copy — that is a standard Windows backup function. Every tool they used came pre-installed. No antivirus has a signature for your own operating system's built-in utilities.

Level 2 — The KV-Botnet: Making China Look Like Kansas City

The first question any analyst asks when examining this intrusion: there must be a login trace. Every network connection leaves a source IP address in the logs. Volt Typhoon solved this with extraordinary ingenuity — they built a secret highway entirely inside America using other people's equipment, without those people's knowledge.

The KV-Botnet — discovered by Lumen Technologies' Black Lotus Labs in December 2023 — is a network of compromised small office and home office routers. Cisco RV320s, Netgear ProSAFE firewalls, DrayTek Vigor routers. End-of-life devices running unpatched 2019 firmware sitting in basements across America, never rebooted, never updated. China compromised them silently and turned them into relay nodes in a secret proxy network.

router Figure 3 — KV-Botnet Traffic Routing: How China Looks Like Kansas City
computer
Origin — China
Operator issues command from Beijing — encrypted and anonymized immediately upon transmission.
public
Relay 1 — New Caledonia
Compromised VPN — Pacific relay hub. Traffic appears to originate here. No US IP yet visible.
router
Relay 2 — Sacramento, CA
Netgear home router — KV-Botnet node. Homeowner has no idea. Log shows US domestic IP.
router
Relay 3 — Phoenix, AZ
Cisco RV320 — small office device. End-of-life firmware. Never patched. Another domestic hop.
bolt
Target — US Power Grid
Log records: "Connection from Phoenix, AZ." The attacker is in Beijing. All traffic encrypted — each hop appears as legitimate HTTPS on port 443 — indistinguishable from normal traffic.
FBI confirmed routing chain in court filings. All traffic appears as legitimate HTTPS — indistinguishable from normal web traffic at every inspection point.
Section 04

The NTDS.dit Problem — Why "Just Change the Passwords" Fails

One of the most common questions when Volt Typhoon's credential dumping activity is disclosed is: why not simply rotate all credentials? They stole the password database — change all the passwords and the stolen data is worthless. This is logical on the surface and completely wrong in practice. Understanding why requires understanding what NTDS.dit actually is and what it enables.

What NTDS.dit Contains

NTDS.dit is the Active Directory database stored on every Windows Domain Controller — the central authentication authority for an entire organization. It contains password hashes for every user account in the domain, service account credentials, Kerberos authentication keys, and critically — the KRBTGT account hash, which allows an attacker to forge what are called Golden Tickets: authentication tokens that grant access to any system in the domain for up to 10 years without requiring a password at all.

Why Rotating Passwords Alone Fails: Rotating all credentials while Volt Typhoon still holds a foothold through a web shell or compromised edge device accomplishes nothing — they dump the new credentials the following day. Rotating passwords without first completely evicting the actor is like changing the locks while the burglar is still inside. The rotation must be simultaneous across thousands of accounts, after confirmed complete eviction, with the KRBTGT account rotated twice to invalidate all forged tickets.

lock_reset Figure 4 — The Credential Rotation Trap
close
Wrong — Fails Every Time
Discover Breach
Volt Typhoon still has active foothold inside the network
Rotate All Passwords
Feels comprehensive — but foothold is still active
Attacker Dumps Again
New credentials harvested the next day from same foothold
Back to Start
Rotation achieved nothing. The lock was changed while they were inside.
check
Correct — The Only Solution
Find ALL Footholds
Web shells, scheduled tasks, compromised edge devices — every one
Evict Completely
Simultaneous across all known access points — not sequential
Rotate KRBTGT ×2
Invalidates all Golden Tickets already forged — both rotations required
Rotate All Credentials
Now effective — no foothold to re-harvest from
Credential rotation without complete eviction first is security theater — the attacker simply dumps the new credentials the following day
1
Complete Eviction Before Rotation — The Non-Negotiable Sequence
Every web shell, every scheduled task, every compromised edge device must be identified and removed simultaneously before any credential rotation begins. This requires a forensic inventory of all persistence mechanisms — not a partial sweep. Partial eviction followed by credential rotation simply tells the attacker which specific footholds survived.
CRITICAL — Incident Response
2
Just-In-Time Elevation — Eliminate Standing Privileges
If there are no standing Domain Admin or Global Admin accounts, there is nothing of value to dump repeatedly. Privileged Identity Management grants elevated access for 30-60 minute windows for approved tasks only. Outside those windows the account does not hold domain admin rights. Volt Typhoon can dump NTDS.dit all they want — the accounts with meaningful privileges do not exist in it persistently.
CRITICAL — Privileged Access Management
3
Behavioral Detection on the Dump Itself
The NTDS.dit dump requires a specific sequence of commands — vssadmin, ntdsutil, or DCSync replication traffic from a non-Domain Controller IP. Alert on any combination of shadow copy creation, SYSTEM hive access, and NTDS.dit file read in a short sequence. Alert on replication protocol traffic originating from any IP that is not a known Domain Controller. These sequences have almost no legitimate explanation.
HIGH — Detection Engineering
Section 05

The Investigation Methodology — Start at the Weakest Link

The counterintuitive insight I draw from analyzing Volt Typhoon's access chain is that investigation must not begin at the high-value target. It must begin at the smallest, least-funded, most overlooked facility in the region — because that is almost certainly where the access chain originated.

Investigator's Principle: A Chinese intelligence operation targeting Electric Boat's submarine program does not start by attacking Electric Boat's hardened network directly. It starts by compromising the water treatment plant three miles away that shares a regional communications network. Or the small HVAC vendor whose technician has physical access to the facility. Or the staffing agency that places contractors. The weakest link in the supply chain determines the security of the entire chain.

account_tree Figure 5 — Supply Chain Access Map: From Weak Link to High-Value Target
water
Entry Points
Weakest Links
  • Municipal water plant — legacy SCADA, no security staff
  • SOHO router — EOL firmware, KV-Botnet node
  • Internet-exposed HMI at rural utility
  • Small HVAC vendor with remote facility access
sync_alt
Pivot
Lateral Movement
  • Shared regional network infrastructure
  • IT managed service provider — shared credentials
  • Vendor remote access tunnel
  • Credential reuse · Living-off-the-land
precision_manufacturing
Supply Chain
Defense Subcontractor
  • CMMC not yet certified
  • Handles CUI technical data
  • Small team — limited SecOps
  • Component supplier to prime contractor
shield
Final Target
Defense Primes
  • Electric Boat — Groton CT
  • Pratt & Whitney — East Hartford
  • Sikorsky — Stratford CT
  • Supply chain is the door
The weakest link in the access chain determines the security of the entire chain — including the most hardened target at the end of it
Section 06

The Legacy OT Crisis — A Policy Failure That Can Cost Lives

The most important statement in this entire analysis is also the simplest: legacy operational technology must be replaced, and the cost of replacement cannot be the reason it is not done. This is not a technology position. It is a public safety position. It is a national security position. The infrastructure that controls water treatment, power distribution, and transportation for millions of Americans is running on software that was never designed to be connected to any network — let alone a network accessible to Chinese state intelligence.

The Cost Accounting Failure: Replacing legacy OT infrastructure at a single utility costs tens to hundreds of millions of dollars. That number appears on the balance sheet immediately and visibly. The cost of a successful Volt Typhoon activation — water contamination, grid failure, transportation collapse, loss of life — appears nowhere on the balance sheet until the day it happens. We do not allow water treatment facilities to run corroded pipes because replacement is expensive. We should not allow them to run 2003-era SCADA firmware because cybersecurity investment is expensive.

Why the Current Approach Has Failed

1
Voluntary Guidance Without Binding Requirements
CISA can advise critical infrastructure operators to patch, segment, and monitor. It cannot compel them. Unlike the defense industrial base — which has CMMC with real legal and contractual consequences for non-compliance — a water treatment plant in rural Connecticut has almost no binding cybersecurity obligations. The result is a massive security gap across exactly the infrastructure a nation-state would target to maximize civilian disruption.
CRITICAL — Regulatory Gap
2
No Liability Framework for Infrastructure Operators
If a utility operating on 20-year-old unpatched SCADA firmware suffers a cyberattack that contaminates water and harms people, who is legally liable? Currently — almost nobody. The absence of liability removes the financial incentive to invest in security modernization. Physical safety standards for this same infrastructure are mandatory and enforceable. Cybersecurity should carry identical standing.
CRITICAL — Legal Framework
3
Funding Exists — Political Will Does Not
The federal government has existing mechanisms to fund critical infrastructure security modernization — infrastructure grants, Critical Infrastructure Protection funds, FEMA preparedness grants, and Department of Energy grid modernization programs. The money exists. What does not exist is the political will to make OT security investment a condition of accessing those funds, or to establish minimum binding cybersecurity standards for infrastructure whose failure would constitute a national emergency.
HIGH — Policy Failure
OT Security ControlCurrent StateRequired StateCost Reality
Network segmentationIT and OT on same network at many facilitiesStrict industrial DMZ — OT never directly reachable from ITHigh but fundable
Patch currencyMany OT systems running EOL firmware from 2003–2015Supported firmware only — replacement of EOL equipmentVery high — but mandatory
Remote accessInternet-exposed HMI interfaces at many small utilitiesNo direct internet exposure — jump server required for any remote accessModerate
Behavioral monitoringLittle or no OT-specific monitoring at small facilitiesContinuous baseline monitoring with anomaly detection on all OT trafficModerate with right tooling
Incident response planMost small utilities have no documented cyber IR planTested, exercised IR playbook including OT-specific scenariosLow — primarily staff time
Section 07

What Would Actually Catch This — Detection Recommendations

Detecting Volt Typhoon requires abandoning signature-based thinking entirely. There are no malicious files to scan for. There are no known-bad IP addresses in the logs. The entire detection strategy must shift from "what is here that should not be" to "what is happening that looks different from what normally happens." Behavioral analytics. Baseline deviation. Anomaly at scale.

Network-Level Detection

Detection TargetWhat to MonitorATT&CK Technique
DCSync from non-DCReplication protocol (MS-DRSR) traffic from any IP not in the known Domain Controller listT1003.006
NTDS.dit access sequencevssadmin + SYSTEM hive copy + NTDS file read within short window — treat as critical incidentT1003.003
LOTL admin command burstnetstat, whoami, ipconfig, net user sequence from single account in short periodT1087, T1049
Off-hours admin authPrivileged account authentication outside 07:00–19:00 local time from any sourceT1078
IT-to-OT lateral movementAny new connection from IT network segment to OT/SCADA IP range — flag and alert immediatelyT1021
Selective log deletionWindows Event Log cleared (Event ID 1102) — especially on Domain Controllers — treat as active incidentT1070.001
SOHO admin interface exposureAny router or firewall with management interface reachable from internet on port 80, 443, 8080, 8443T1133
Anomalous outbound volumeOutbound traffic to any destination exceeding 3× 30-day baseline from OT-adjacent systemsT1041

The Behavioral Baseline Imperative

The single most important detection capability against LOTL attacks is a mature behavioral baseline — knowing what normal looks like in granular detail so that abnormal is visible even when it uses legitimate tools.

What Good Baseline Detection Looks Like: Admin account X logs in Monday through Friday between 8am and 6pm from IP range 10.x.x.x. They run 15-20 standard commands per session. They access 3-4 specific server groups. They never touch OT systems. The day they log in at 2am from a Phoenix Arizona IP address, run 47 commands in 12 minutes including netstat and whoami, and query Active Directory for all user accounts — that pattern fires an alert regardless of whether any individual command is technically malicious. The deviation from baseline IS the detection. This is the approach that Volt Typhoon's technique cannot evade.

Section 08

Implications for Connecticut Defense Contractors

This analysis is written specifically for the defense industrial base in Connecticut — the supply chain that builds nuclear submarines at Electric Boat in Groton, jet engines at Pratt and Whitney in East Hartford, and military helicopters at Sikorsky in Stratford. These are among the most secure private facilities in the country internally. The threat is not to their internal networks directly. The threat is to the infrastructure around them — and through that infrastructure, to them.

The Uncomfortable Reality: If Volt Typhoon is embedded in the regional power grid that supplies Electric Boat's facility, the submarine program has a vulnerability that no amount of internal cybersecurity investment addresses. If they are in the water treatment system that serves Groton, the manufacturing facility has a physical security dependency on infrastructure it does not control. CMMC compliance protects the contractor's own systems. It does not protect the ecosystem those systems depend on.

NIST SP 800-171 ControlControl IDVolt Typhoon RelevanceGap Assessment
System and communications protection3.13.1Network segmentation between IT and OTFrequently absent at small subcontractors
Audit and accountability3.3.1Log retention and review — catching LOTL activityLogs kept but rarely reviewed actively
Configuration management3.4.1Baseline configurations — detect deviationsOT baselines rarely documented
Identification and authentication3.5.3MFA on all privileged and remote accessIT MFA common — OT MFA rare
Incident response3.6.1Playbooks for LOTL and credential theft scenariosOT-specific IR plans largely absent
Supply chain risk management3.1.20Vendor access controls and monitoringMost critical gap — supply chain is the entry point
Section 09

Conclusion — The War That Is Already Happening

Volt Typhoon is not a theoretical future threat. It is an active, ongoing, confirmed operation that has been running inside the infrastructure Americans depend on for basic survival — power, water, communications, transportation — for more than five years. The FBI Director has confirmed it. The Air Force cyber commander has called its potential activation "total war." Dragos has confirmed some footholds will never be found.

The question this analysis has tried to answer is not whether the threat is real — it is demonstrably real. The question is why it persists, why remediation is so difficult, and what actually needs to change. The answers point not primarily to technology failures but to policy failures: voluntary guidance where mandatory standards are needed, absent liability where accountability should exist, and deferred investment in legacy OT infrastructure where replacement should have been funded a decade ago.

Final Assessment: A water treatment plant running on unpatched 2003-era SCADA firmware three miles from a nuclear submarine construction facility is not an acceptable national security posture. Neither is a regional power grid with a Chinese state actor embedded in its control loop. The technical solutions exist. The detection methods exist. The funding mechanisms exist. What is missing is the political will to treat critical infrastructure cybersecurity as the life-safety issue it already is — and to act accordingly before the first activation, not after. The cost of prevention is measured in millions. The cost of the alternative is measured in lives.

All findings in this report are based on publicly available information including reports from CISA, NSA, FBI, Microsoft Threat Intelligence, Dragos, Lumen Black Lotus Labs, Mandiant, CrowdStrike, Secureworks, SecurityScorecard, the US Air Force, Congressional Research Service, and MITRE ATT&CK. This represents the author's independent analysis and does not reflect the views of any employer or client organization.

YI
Yana Ivanov
Security Analyst  ·  CMMC Compliance Analyst  ·  SiteWave Studio

Yana Ivanov is a security analyst and CMMC consultant based in Connecticut, specializing in cybersecurity risk assessment for defense contractors in the Connecticut defense industrial base — Electric Boat, Pratt and Whitney, Sikorsky, and their supply chains. With 15 years of enterprise technology experience and an MS in Information Systems, she brings a practitioner perspective to threat intelligence analysis with a focus on the intersection of operational technology security, CMMC compliance, and nation-state threat actors. She is pursuing CompTIA Security+ and CMMC Registered Practitioner certification. This analysis was produced independently as a contribution to the security community's understanding of persistent nation-state threats to US critical infrastructure.

Portfolio