The Cybersecurity and Infrastructure Security Agency, the National Security Agency, and the Federal Bureau of Investigation issued a joint advisory on January 11, 2026, warning that Chinese state-sponsored threat actor Volt Typhoon has been discovered pre-positioned in previously unreported segments of US critical infrastructure. The advisory reveals persistent access in the water, energy, and transportation sectors, with some compromises undetected for 12-18 months.

Advisory overview

AttributeDetails
Advisory dateJanuary 11, 2026
Issuing agenciesCISA, NSA, FBI
International partnersFive Eyes (Australia, Canada, NZ, UK)
Threat actorVolt Typhoon
AttributionChinese state-sponsored (PRC)
MissionPre-positioning for potential future disruption

Newly discovered compromises

Incident response engagements between August 2025 and January 2026 uncovered Volt Typhoon footholds across multiple sectors:

Water and wastewater

FindingDetails
Affected facilitiesMunicipal water treatment in 4+ states
Access levelOperational technology (OT) networks
CapabilityControl of chemical treatment processes
Dwell time12-18 months undetected

Energy sector

FindingDetails
Affected utilitiesRegional electric utilities (Midwest, Southeast)
Access levelIT and OT environments
Populations servedMultiple states
Dwell time12-18 months undetected

Transportation

FindingDetails
Affected systemsPort authority networks, freight rail signaling
Geographic focusEast Coast
Access levelLogistics management platforms
Dwell time12-18 months undetected

Assessment: Pre-positioning, not espionage

The advisory emphasizes a critical distinction:

“During investigations, the agencies discovered that Volt Typhoon activity did not align with cyber espionage purposes. The U.S. authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions.”

Traditional EspionageVolt Typhoon Behavior
Data exfiltrationMinimal data theft
Intelligence gatheringAccess maintenance
Active operationsDormant footholds
Immediate objectivesFuture disruption capability

The assessment indicates preparation for potential sabotage during a future geopolitical crisis, not current intelligence collection.

Living-off-the-land tradecraft

Volt Typhoon’s operational tradecraft relies almost exclusively on legitimate system tools, making detection exceptionally difficult.

Techniques observed

CategoryTechnique
Initial accessExploiting vulnerabilities in internet-facing appliances
C2 infrastructureCompromised SOHO routers and VPN appliances as relay nodes
Credential harvestingntdsutil, volume shadow copies for AD database extraction
Lateral movementPowerShell, WMI, Remote Desktop Protocol
PersistenceNative Windows scheduled tasks, services
Defense evasionLog deletion, timestamp manipulation

Exploited appliances

VendorProduct
FortinetFortiGuard
IvantiConnect Secure
NETGEARProSAFE devices

Why LOTL works

FactorEffect
No custom malwareSignature-based detection fails
Legitimate toolsActivity blends with admin operations
Domestic IP proxiesTraffic appears to originate from US
Minimal artifactsForensic investigation hindered

“Traditional signature-based security tools are largely ineffective against these techniques. Detection requires behavioral analytics capable of identifying anomalous patterns in the use of legitimate administrative tools.”

Historical context

Timeline

DateEvent
May 2023Microsoft discloses Volt Typhoon targeting Guam, US territories
2024CISA advisories confirm telecom, ISP, MSP compromises
February 2024CISA reports 5+ years of access in some networks
January 2026Water, energy, transportation compromises revealed

Expanding footprint

PhaseTargets
2023Guam, Pacific territories
2024Telecommunications, ISPs, IT providers
2026Water, energy, transportation (continental US)

The threat has expanded from strategic Pacific locations to mainland critical infrastructure.

Five-year persistence

Prior CISA advisories confirmed that Volt Typhoon actors maintained access to some victim IT environments for at least five years without detection.

Persistence FactorVolt Typhoon Approach
Detection avoidanceLOTL techniques, no malware
Long-term accessMinimal activity, dormant footholds
RedundancyMultiple access paths per target
PatienceStrategic positioning over years

Geopolitical context

Taiwan tensions

The advisory arrives amid heightened tensions in the Taiwan Strait. US intelligence consistently assesses that Volt Typhoon’s pre-positioning provides China capability to:

  • Disrupt military logistics during potential Taiwan conflict
  • Impact civilian infrastructure to create domestic pressure
  • Degrade emergency response capabilities

FBI Director assessment

“The defining cyber challenge of our generation… Volt Typhoon’s access to critical infrastructure was designed to cause real-world harm to American citizens at a time and place of China’s choosing.” — FBI Director Christopher Wray

China’s denial

China has repeatedly denied involvement:

  • Ministry of Foreign Affairs calls attribution “groundless and irresponsible”
  • State media alleges Volt Typhoon narrative is fabricated
  • Claims US intelligence seeks to justify surveillance spending

Sector responses

Water ISAC

  • Emergency bulletin issued within hours of advisory
  • Sector-specific detection guidance provided
  • Emergency briefings for water utility operators

Electricity sector (ESCC)

  • Emergency meeting convened with DOE
  • Discussion of OT-specific monitoring tools
  • Focus on LOTL detection in industrial control systems

Congressional response

Bipartisan legislation introduced in the Senate would authorize $2.5 billion in grants for small and mid-sized utilities to improve cybersecurity posture.

Mitigation guidance

The advisory includes detailed guidance co-authored by CISA, NSA, FBI, and Five Eyes partners.

Priority actions

PriorityAction
CriticalImplement comprehensive logging (admin tools, PowerShell, remote access)
CriticalNetwork segmentation between IT and OT
CriticalPatch internet-facing appliances immediately
CriticalReplace EOL SOHO routers and VPN appliances
HighProactive threat hunting using published IOCs
HighPhishing-resistant MFA on all admin/remote access

Detection focus

IndicatorDetection Method
LOTL tool abuseBehavioral analytics, baseline deviation
Unusual admin activitySIEM correlation, time-based anomalies
SOHO router compromiseNetwork traffic analysis, firmware verification
Lateral movementAuthentication pattern analysis

CISA resources

ResourceDescription
Free vulnerability scanningFor critical infrastructure operators
Assessment servicesOn-site security evaluation
Sector ISACsIndustry-specific threat sharing

Key assessment

The advisory concludes with a stark warning:

“The US government assesses with high confidence that Volt Typhoon actors maintain active, undiscovered access to additional critical infrastructure networks beyond those identified to date.”

Organizations in all critical infrastructure sectors should treat the threat as ongoing.

Recommendations

For critical infrastructure operators

TimeframeAction
ImmediateReview and patch internet-facing appliances
ImmediateImplement IT/OT network segmentation
This weekEnable comprehensive logging
This monthConduct threat hunting using CISA indicators
OngoingParticipate in sector ISAC

For all organizations

ControlPurpose
Behavioral analyticsDetect LOTL technique abuse
SOHO device inventoryIdentify and replace vulnerable equipment
Admin activity monitoringBaseline and alert on anomalies
Incident response planningPrepare for potential infrastructure disruption

Context

Volt Typhoon represents a paradigm shift in nation-state cyber operations. Rather than traditional espionage focused on stealing information, the campaign appears designed to create options for future disruption.

The 12-18 month dwell times in newly discovered compromises—combined with prior reports of 5-year persistence—demonstrate that detection of sophisticated LOTL operations remains extremely challenging.

The advisory’s “high confidence” assessment that additional undiscovered compromises exist should prompt every critical infrastructure operator to assume they may be targeted and implement detection capabilities accordingly.

The $2.5 billion in proposed Congressional funding reflects the scale of the challenge: defending distributed critical infrastructure against a patient, well-resourced nation-state adversary requires sustained investment in capabilities that most utilities currently lack.