You are here

(TLP:CLEAR) Dragos Case Study of Volt Typhoon’s Breach of a Massachusetts Electric and Water Utility

(TLP:CLEAR) Dragos Case Study of Volt Typhoon’s Breach of a Massachusetts Electric and Water Utility

TLP:CLEAR
Created: Thursday, March 13, 2025 - 14:44
Categories:
Cybersecurity, OT-ICS Security, Security Preparedness

Summary: In a recent report and case study, Dragos details their work helping a combined electric and water utility remediate the impact of a cyber attack from the Chinese-affiliated threat group known as Volt Typhoon.

Analyst Note: Dragos stated this attack was later determined to be part of a larger effort by China’s government to preposition themselves within U.S. critical infrastructure. The utility noticed its systems were breached before Thanksgiving 2023 and, after further investigation, it was revealed that Volt Typhoon had been in the utility’s systems since February 2023, a 10-month period of time. Notably, the report indicates that Volt Typhoon’s apparent goals aren’t solely to maintain persistent access.

A Dragos expert explains: “The significance of the discovery of this attack is that it highlights that the adversary not only aimed to maintain persistent access to the victim's environment for a long tenure, but also were aiming to exfiltrate specific data related to OT operating procedures and spatial layout data relating to energy grid operations.”

Utilities are recommended to review WaterISAC’s previous coverage of Volt Typhoon, review the remediation and mitigation recommendations included, and remain alert to the ongoing threat climate.

Original Source: https://therecord.media/volt-typhoon-hackers-utility-months

Additional Reading:

Related WaterISAC PIRs: 6, 6.1, 7, 7.1, 8, 9, 10, 10.2, 12