🇨🇳

Volt Typhoon

High ConfidenceCritical Threat

Vanguard Panda • BRONZE SILHOUETTE • Dev-0391 • UNC3236 • Voltzite • Insidious Taurus

Volt Typhoon is a People's Republic of China (PRC) state-sponsored cyber actor that has been active since at least 2021. The group has been assessed by CISA, NSA, FBI, and Five Eyes partners with high confidence as seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States. Unlike traditional cyber espionage operations, Volt Typhoon's choice of targets and pattern of behavior is not consistent with intelligence gathering operations, instead focusing on gaining and maintaining persistent access to operational technology (OT) systems. The group is characterized by its extensive use of living-off-the-land (LOTL) techniques, leveraging native Windows tools and legitimate credentials to blend in with normal system activity. Volt Typhoon conducts extensive pre-compromise reconnaissance to understand target network architecture and operational protocols, then tailors their tactics to each victim environment. The group has demonstrated the capability to maintain access within some victim IT environments for at least five years, with confirmed compromises in Communications, Energy, Transportation Systems, and Water and Wastewater Systems sectors across the continental United States and its territories, including Guam.

Origin: China
Sponsor: PRC State-sponsored (MSS/PLA)
Active: 2021 - Present
Victims: Multiple critical infrastructure organizations
Elite
Active
Pre-positioningDisruptionStrategic Access
Risk Assessment
96
Composite Risk Score
Critical Risk
ARCS Compliance95
Escalation Risk98
Grievance Index85
Infrastructure Impact99
History & Evolution

Volt Typhoon is a People's Republic of China (PRC) state-sponsored cyber actor that has been active since at least 2021. The group has been assessed by CISA, NSA, FBI, and Five Eyes partners with high confidence as seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States. Unlike traditional cyber espionage operations, Volt Typhoon's choice of targets and pattern of behavior is not consistent with intelligence gathering operations, instead focusing on gaining and maintaining persistent access to operational technology (OT) systems. The group is characterized by its extensive use of living-off-the-land (LOTL) techniques, leveraging native Windows tools and legitimate credentials to blend in with normal system activity. Volt Typhoon conducts extensive pre-compromise reconnaissance to understand target network architecture and operational protocols, then tailors their tactics to each victim environment. The group has demonstrated the capability to maintain access within some victim IT environments for at least five years, with confirmed compromises in Communications, Energy, Transportation Systems, and Water and Wastewater Systems sectors across the continental United States and its territories, including Guam.

Targeting

Target Sectors

Critical InfrastructureCommunicationsEnergyTransportationWater and WastewaterGovernment

Target Regions

United StatesGuamU.S. Territories
Attribution & Affiliations

Attributed to PRC State-sponsored (MSS/PLA) (China). Attribution confidence: High.

Intelligence Assessment
Critical
Threat Level
Highly
Targeting
Highly
Adaptability
Very High
Persistence
Continuous
Op Tempo
Active
Status

Future Outlook

Volt Typhoon represents one of the most significant threats to U.S. critical infrastructure. The group is expected to continue pre-positioning operations, with potential for disruptive or destructive attacks during geopolitical tensions with China.

Timeline of Key Events
2021
Major

First observed activity attributed to Volt Typhoon

May 2023
Major

Joint Five Eyes advisory published on Volt Typhoon activity

January 2024
Major

DOJ disrupts KV Botnet used by Volt Typhoon

February 2024
Major

CISA Advisory AA24-038A warns of critical infrastructure pre-positioning