Welcome to VelSicuro.com | Cybersecurity Solutions

Unmasking Volt Typhoon: The 'Ghost' Tactics of Chinese Hackers Targeting US and Taiwanese Critical Infrastructure
By VELSICURO
24 October 2025
34 views
Internasional

Unmasking Volt Typhoon: The 'Ghost' Tactics of Chinese Hackers Targeting US and Taiwanese Critical Infrastructure

Geopolitical tensions between China, the United States, and Taiwan have spilled over into a new, far more dangerous arena: cyberspace. A Chinese state-sponsored hacking group, identified as Volt Typhoon, is now at the center of global cybersecurity concerns.

Unlike typical cyber attacks, Volt Typhoon is not aimed at stealing money. Their mission is far more sinister: to conduct long-term infiltration and plant hidden access within the critical infrastructure of the US and Taiwan.

 

Primary Goal: 'Pre-positioning' for Conflict

 

Volt Typhoon's activity is focused on espionage and what experts call 'pre-positioning'. Their targets are vital sectors such as energy, water, transportation, and communications.

The primary goal is believed to be establishing a foothold for future sabotage. If a military conflict or heightened political tension were to arise—for instance, over the issue of Taiwan—this pre-planted access could be activated to cripple vital civilian services, create chaos, and hinder a military response.

 

The 'Living off the Land' (LotL) Tactic

 

One of the signature traits that makes Volt Typhoon exceptionally difficult to detect is their use of the 'Living off the Land' (LotL) technique.

Instead of using custom malware or viruses that are easily flagged by antivirus software, they leverage tools and scripts already present within the target's operating system. They use native system features like PowerShell or Windows Management Instrumentation (WMI) to move within the network.

To security systems, their activity looks just like normal system administrator behavior. This allows them to blend in and hide within a victim's network for extended periods without detection.

 

Abusing IoT Devices as Stepping Stones

 

To further cover their tracks, Volt Typhoon is also known for exploiting vulnerable Internet of Things (IoT) devices, such as old routers, security cameras, and smart home devices with outdated security.

These compromised devices are used as 'proxies' or stepping stones. This makes their attack traffic appear to originate from random locations worldwide, making it incredibly difficult to trace back to their actual command and control (C2) servers.

 

Global Implications, A Warning for All

 

The attacks on US and Taiwanese infrastructure are a clear signal from China of its cyber warfare capabilities. For Taiwan, this is a constant threat aimed at intimidation and disrupting national stability.

Although the primary targets are the US and Taiwan, the techniques used by Volt Typhoon have global implications. Critical infrastructure in other countries, including Indonesia, is just as vulnerable to LotL tactics and IoT exploitation. This incident must serve as a serious warning for all nations to urgently strengthen their cybersecurity posture in protecting vital national assets.

 

Reference: https://csirt.or.id/berita/serangan-siber-china-as-taiwan

Need Any Technology Solution

Let’s Work Together on Project

GET STARTED
velsicuro.com