All cases

Volt Typhoon — US Critical Infrastructure Pre-positioning

2023 – 2024 (disclosed 2024)

EspionagePeak: IntrusionAttribution: High ConfidenceCritical InfrastructureEnergyTelecommunications
Year
2024
Actor country
China
Target regions
United States, Guam
Unpeace score
6

Executive Summary

PRC-linked threat actor assessed to be pre-positioning access in US critical infrastructure — including water, energy, communications, and transportation systems — as preparation for potential disruptive operations in a Taiwan contingency scenario. The most significant allied joint attribution in the dataset, involving all Five Eyes nations in coordinated advisories.

Why This Matters

Volt Typhoon represents the clearest case of peacetime pre-positioning in adversary critical infrastructure, forcing an urgent policy reckoning on whether such activity constitutes a threat of force and how states should respond to it below the threshold of armed conflict.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2023
Intrusion

Living-off-the-land access

Actor used legitimate credentials and native system tools to establish persistent access across US CI networks, avoiding traditional malware signatures.

2024
Probing

Infrastructure mapping and pre-positioning

Activity consistent with mapping operational technology environments and maintaining access for future use, not immediate data exfiltration.

Threshold Crossings

  • First publicly documented campaign of peacetime pre-positioning across multiple US critical infrastructure sectors simultaneously
  • Reframed the espionage/pre-attack distinction as a policy-urgent question

Restraint Factors

  • No disruptive or destructive actions observed — activity consistent with preparation, not execution
  • Living-off-the-land techniques suggest intent to avoid detection and maintain long-term access

Attribution Assessment

High ConfidenceVolt Typhoon, attributed by the US, UK, Australia, Canada, and New Zealand to PRC state-sponsored actors
China
Volt TyphoonBRONZE SILHOUETTEVanguard Panda
1. Technical

Threat actor mapped to China based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: Microsoft: Volt Typhoon targets US critical infrastructure

2. Political / Legal
Public Attribution
  • Five Eyes joint advisory — the broadest allied attribution in the dataset (Feb 2024)
  • CISA Emergency Guidance for CI owners on Volt Typhoon detection
  • FBI disrupted Volt Typhoon botnet infrastructure (KV Botnet takedown, Jan 2024)

Sources: CISA/NSA/FBI Joint Advisory: Volt Typhoon; FBI: Court-Authorized Operation Disrupts KV Botnet

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

High Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

6

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak2/6
Threshold crossings2/4
Governance flags4/8
Sectors affected5/6
Entanglement8/10
Country scope2/6

Coercive Function

Espionage

Intelligence collection — coercive value lies in the information advantage gained and the implicit signal that the adversary can access sensitive systems.

Observed coercive effects

  • First publicly documented campaign of peacetime pre-positioning across multiple US critical infrastructure sectors simultaneously
  • Reframed the espionage/pre-attack distinction as a policy-urgent question

Entanglement Risk

Entanglement score8

Sectors affected

Critical InfrastructureEnergyTelecommunicationsTransportationMultiple Sectors

Countries / regions

United StatesGuam

Impact summary

Persistent access established across US water, energy, communications, and transportation infrastructure; no disruption executed.

Infrastructure Meaning

Capability profile

Persistent access established across US water, energy, communications, and transportation infrastructure; no disruption executed.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Responsible state behavior in ICT use (UN OEWG)
  • Pre-positioning in critical infrastructure as a destabilizing activity
  • Due diligence obligations of states regarding their territory

Policy responses

  • Five Eyes joint advisory — the broadest allied attribution in the dataset (Feb 2024)
  • CISA Emergency Guidance for CI owners on Volt Typhoon detection
  • FBI disrupted Volt Typhoon botnet infrastructure (KV Botnet takedown, Jan 2024)

Regulatory changes

  • Directly shaped US National Cybersecurity Strategy implementation priorities
  • Accelerated CISA cross-sector risk management directives
  • Informed proposed critical infrastructure cybersecurity legislation

Governance impact assessment

Generated the most significant Five Eyes joint attribution to date and reframed critical infrastructure pre-positioning as the defining cyber threat of the current strategic environment, directly shaping US infrastructure security legislation.

Sources

G

CISA/NSA/FBI Joint Advisory: Volt Typhoon

Government2024-02-07
V

Microsoft: Volt Typhoon targets US critical infrastructure

Vendor Report2023-05-24
G

FBI: Court-Authorized Operation Disrupts KV Botnet

Government2024-01-31

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.