WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Dragos Case Study of Volt Typhoon’s Breach of a Massachusetts Electric and Water Utility
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Dragos Case Study of Volt Typhoon’s Breach of a Massachusetts Electric and Water Utility

TLP:CLEAR

Author: Chase Snow

Created: Thursday, March 13, 2025 - 14:44

Categories: Cybersecurity, OT-ICS Security, Security Preparedness

Summary: In a recent report and case study, Dragos details their work helping a combined electric and water utility remediate the impact of a cyber attack from the Chinese-affiliated threat group known as Volt Typhoon.

Analyst Note: Dragos stated this attack was later determined to be part of a larger effort by China’s government to preposition themselves within U.S. critical infrastructure. The utility noticed its systems were breached before Thanksgiving 2023 and, after further investigation, it was revealed that Volt Typhoon had been in the utility’s systems since February 2023, a 10-month period of time. Notably, the report indicates that Volt Typhoon’s apparent goals aren’t solely to maintain persistent access.

A Dragos expert explains: “The significance of the discovery of this attack is that it highlights that the adversary not only aimed to maintain persistent access to the victim’s environment for a long tenure, but also were aiming to exfiltrate specific data related to OT operating procedures and spatial layout data relating to energy grid operations.”

Utilities are recommended to review WaterISAC’s previous coverage of Volt Typhoon, review the remediation and mitigation recommendations included, and remain alert to the ongoing threat climate.

Original Source: https://therecord.media/volt-typhoon-hackers-utility-months

Additional Reading:

  • People’s Republic of China Cyber Threat
  • (TLP:CLEAR) WaterISAC Advisory – PRC-sponsored Volt Typhoon Activity and Supplemental Living Off the Land Guidance
  • Threat Awareness – CISA and FBI Release Joint Statement as Volt Typhoon’s Botnet Resurfaces
  • (TLP:AMBER) Volt Typhoon Cyber Tactics Warrant Proactive Defense of US Critical Infrastructure Networks

Related WaterISAC PIRs: 6, 6.1, 7, 7.1, 8, 9, 10, 10.2, 12

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar