China's Volt Typhoon Hackers Lurked in US Electric Grid for Nearly a Year

A newly revealed cyberattack has exposed a disturbing reality: a Chinese state-sponsored hacking group known as Volt Typhoon secretly infiltrated a U.S. electric utility's network and remained undetected for over 300 days. The attack, which targeted the Littleton Electric Light and Water Departments (LELWD) in Massachusetts, highlights the growing threat to U.S. critical infrastructure.
Table of Contents
The Volt Typhoon Intrusion: A 300-Day Cyber Espionage Operation
According to ICS/OT security firm Dragos, Volt Typhoon gained access to LELWD’s network in February 2023. Their presence went unnoticed until November 2023, when Dragos detected the intrusion during the implementation of its security solutions at the utility. This discovery led to a fast-tracked deployment of Dragos’ defenses to mitigate the breach.
Volt Typhoon, also known as Voltzite, was first publicly identified in May 2023 by Microsoft, which linked the group to the Chinese government. Since then, the group has gained a reputation for its highly sophisticated cyber espionage campaigns, targeting U.S. critical infrastructure.
What Were the Hackers After?
Unlike typical cybercriminal groups that aim for ransomware or financial gain, Volt Typhoon’s activities indicate a strategic, long-term objective. According to Dragos, the hackers:
- Maintained long-term access to the utility’s operational technology (OT) network, which controls physical infrastructure.
- Stole sensitive OT-related data, including operational procedures and system layouts.
- Exfiltrated geographic information system (GIS) data, which contains critical details about the energy grid’s spatial layout.
This type of intelligence could allow future cyber-physical attacks, where hackers not only disrupt systems remotely but also know exactly what to target for maximum damage.
Why is this a Major Security Concern?
Dragos warned that while Volt Typhoon has not yet been observed actively disrupting industrial control systems (ICS), their persistent access and data exfiltration signal potential preparations for future attacks.
The ICS Cyber Kill Chain classifies attacks into multiple stages. So far, Volt Typhoon appears to be at Stage 1, which involves reconnaissance and data theft. However, if they progress to Stage 2, they could develop and test targeted attacks on U.S. power grids, water systems, or other critical infrastructure.
China’s Cyber Warfare Strategy: Laying the Groundwork for Future Attacks?
This incident fits into a broader pattern of Chinese cyber espionage targeting U.S. infrastructure. Security experts believe groups like Volt Typhoon are not just conducting surveillance but are laying the groundwork for potential future conflicts.
By infiltrating and mapping out critical systems years in advance, China could position itself to launch devastating cyberattacks in the event of escalating geopolitical tensions. This aligns with previous warnings from U.S. intelligence agencies, which have cautioned that China is actively probing American infrastructure for vulnerabilities.
The Need for Stronger OT Security
The LELWD incident serves as a wake-up call for all utilities and critical infrastructure providers. Many smaller public utilities lack the cybersecurity resources of larger organizations, making them attractive targets for nation-state hackers.
Dragos' case study emphasizes the importance of real-time monitoring, network segmentation, and intrusion detection in protecting OT environments. Without these defenses, hackers can remain undetected for months—or even years—gathering intelligence and preparing for potential cyber warfare.
A Growing Threat that cannot be Ignored
The Volt Typhoon attack on LELWD proves that nation-state hackers are already inside U.S. critical infrastructure, not just testing defenses but actively collecting intelligence for potential future attacks.
With increasing geopolitical tensions and cyber threats evolving, the U.S. must prioritize strengthening its cyber defenses—before it's too late.