A dozen allied agencies say China is building covert hacker networks out of everyday routers

April 27, 20265 min read3 sources
Share:
A dozen allied agencies say China is building covert hacker networks out of everyday routers

An unprecedented global warning

In a rare display of unified concern, a coalition of a dozen cybersecurity agencies from the United States, its Five Eyes partners, and other allied nations has issued a stark warning: A state-sponsored Chinese cyber actor, dubbed "Volt Typhoon," is systematically compromising critical infrastructure networks. The joint advisory details a significant evolution in tactics, where the goal is not immediate data theft but long-term, stealthy persistence for potential future disruption (CISA, 2023).

The advisory, co-authored by agencies including the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the FBI, represents a broad international consensus on the threat. This is not just another espionage campaign; officials describe it as the deliberate pre-positioning of offensive capabilities within the networks that control essential services like communications, energy, and water systems.

A tactical shift: Living off the land and hijacked routers

Volt Typhoon’s methodology marks a departure from the noisy, malware-heavy intrusions of the past. The group’s primary strategy is to blend in, making detection exceedingly difficult. They achieve this through two core techniques: compromising edge devices and "living off the land."

First, the actors build a covert command-and-control (C2) network by hijacking insecure, consumer-grade internet-facing devices. This includes Small Office/Home Office (SOHO) routers, firewalls, and network-attached storage (NAS) from a variety of manufacturers like Cisco, Fortinet, and Netgear. By routing their malicious traffic through this web of compromised devices, Volt Typhoon effectively launders its digital location, making it nearly impossible to trace attacks back to their origin in China.

Once they gain an initial foothold in a target organization—often by exploiting a vulnerability in an external-facing device—the second phase begins. Instead of deploying custom malware that could be flagged by antivirus software, Volt Typhoon "lives off the land" (LOTL). This technique involves using legitimate, built-in system administration tools that are already present on the target network. Microsoft, which first identified the activity in mid-2021, notes the group uses commands like PowerShell, Windows Management Instrumentation (WMI), and `netsh` to explore the network, steal credentials, and move laterally (Microsoft, 2023).

By using these native tools, the attackers’ activity looks like routine network administration. They can dump credentials from memory, create new user accounts, and exfiltrate data using encrypted channels that mimic normal traffic. This ghost-in-the-machine approach allows them to persist within a network for years without being discovered, patiently mapping systems and securing access to critical control systems.

Impact assessment: Pre-positioning for conflict

The strategic objective behind Volt Typhoon's campaign is what security officials find most alarming. This is not about stealing intellectual property or financial data. The primary goal, according to the joint advisory, is to secure long-term access to critical infrastructure for the purpose of disrupting or destroying it during a future crisis.

"For years, China has been conducting increasingly aggressive cyber operations... This latest activity is a concerning evolution," said CISA Director Jen Easterly. The NSA's Cybersecurity Director, Rob Joyce, added that the actor is "seeking to maintain stealthy, persistent access to critical infrastructure networks."

The targets are not random. The campaign has focused on sectors vital to a nation's ability to function and respond to a military conflict, including communications, energy, transportation, and water systems. This activity is widely seen by intelligence analysts as part of a broader strategy by the People's Republic of China (PRC) to gain an advantage in any potential conflict, particularly one involving Taiwan. By pre-positioning these cyber capabilities, Beijing could sow chaos and hamper the U.S. and its allies' ability to mobilize and respond.

The indirect victims are numerous. The owners of the thousands of compromised SOHO routers and firewalls are unwitting accomplices, their devices forming the backbone of the attack infrastructure. The ultimate potential victims are the general public, who rely on the stable operation of the critical services now under threat.

How to protect yourself from Volt Typhoon

Defending against an adversary that uses legitimate tools and hides within legitimate traffic requires a fundamental shift in security posture. Signature-based detection is not enough. Organizations must move toward behavioral analysis and a Zero Trust security model.

For Critical Infrastructure and Large Organizations:

  • Harden Internet-Facing Devices: Immediately patch all systems, especially routers, firewalls, and VPN appliances. Change any default administrator credentials and disable unnecessary ports and services.
  • Implement Network Segmentation: Divide your network into smaller, isolated zones to prevent an intruder from moving freely from a less-sensitive system (like email) to a critical operational technology (OT) network.
  • Enforce Multi-Factor Authentication (MFA): Require MFA for all services, especially for remote access and privileged accounts. This makes stolen credentials much less useful to an attacker.
  • Enhance Logging and Monitoring: Ensure comprehensive logging is enabled for all critical systems and network devices. Actively hunt for anomalous behavior, such as administrative tools being used at odd hours, from unusual locations, or in strange sequences. Monitor for unexpected outbound connections from your internal network.
  • Adopt a Zero Trust Mindset: Operate under the assumption that a breach is inevitable or has already occurred. Verify every connection and user explicitly, regardless of whether they are inside or outside the network perimeter.

For Small Businesses and Home Users:

While large organizations are the ultimate target, SOHO devices are the means. Securing these devices is a collective defense responsibility.

  • Update Your Router: Regularly check your router manufacturer’s website for firmware updates and install them immediately.
  • Change Default Passwords: Never use the default administrator username and password that came with your device. Choose a long, complex, and unique password.
  • Disable Remote Management: If you do not need to manage your router from outside your home or office network, disable this feature.

The Volt Typhoon campaign is a clear signal that state-sponsored cyber threats are evolving in sophistication and strategic intent. The coordinated international response underscores the severity, demanding that all organizations, from critical infrastructure operators to small businesses, re-evaluate their defenses against an adversary that is already inside the gates.

Share:

// FAQ

What is Volt Typhoon?

Volt Typhoon is the name given to a state-sponsored cyber actor linked to the People's Republic of China (PRC). This group specializes in stealthy, long-term intrusions into critical infrastructure networks with the likely goal of pre-positioning for future disruptive attacks.

What does 'living off the land' (LOTL) mean?

Living off the land is a hacking technique where attackers use legitimate, pre-existing tools and software on a target's system to carry out their objectives. Instead of installing custom malware, they use built-in utilities like PowerShell or WMI, which makes their activity look like normal administrative work and helps them evade detection.

Why are SOHO routers being targeted in this campaign?

Volt Typhoon targets Small Office/Home Office (SOHO) routers, firewalls, and other edge devices because they are numerous, often have weak security (like default passwords or unpatched firmware), and are not actively monitored. By compromising thousands of these devices, the attackers create a vast, disposable proxy network to hide their true location and make their malicious traffic difficult to trace.

How can I protect my home or small business router?

To protect your router, you should first change the default administrator password to something strong and unique. Second, ensure your router's firmware is always up to date by enabling automatic updates or checking the manufacturer's website regularly. Finally, disable remote administration features if you do not explicitly need them.

// SOURCES

// RELATED

Kinetic strike, cyber impact: Analyzing the Ukrainian drone attack on Russia's Nizhny Novgorod oil refinery

A deep-dive analysis of the Ukrainian drone attack on a Russian oil refinery, exploring its impact on critical infrastructure and cyber-physical secur

6 min readMay 3

Ukrainian drone strikes on Russian oil refineries signal a new era of hybrid warfare

A detailed analysis of how Ukrainian drone strikes on Russian oil refineries exemplify a new form of hybrid warfare, blending cyber intelligence with

6 min readMay 3

The silent strike: How cyberattacks on energy infrastructure define the war in Ukraine

While physical strikes on Russian oil dominate headlines, a silent war against Ukraine's energy grid reveals the blueprint for modern hybrid warfare.

6 min readMay 3

China-linked hackers target Asian governments, NATO state, journalists, and activists

A newly identified China-aligned hacking group, SHADOW-EARTH-053, is targeting Asian governments, a NATO member, journalists, and activists in a broad

6 min readMay 2