Pull to refresh
Logo
Daily Brief
Following
Why Ranks Sign Up
China's silent invasion: hackers embedded in America's critical infrastructure

China's silent invasion: hackers embedded in America's critical infrastructure

Force in Play

Volt Typhoon and Salt Typhoon campaigns position Beijing to disrupt power, water, and communications during a Taiwan crisis

January 17th, 2025: Treasury Sanctions Chinese Cyber Company

Overview

Chinese hackers have burrowed deep into America's power grids, water systems, telecommunications networks, and transportation infrastructure—not to steal secrets, but to flip a kill switch. The Pentagon's December 2024 report confirms Beijing expects to fight and win a war over Taiwan by 2027.

Volt Typhoon has pre-positioned capabilities to shut down pipelines, derail trains, and sever communications between the mainland and Hawaii. In a secret December Geneva meeting, Chinese officials indirectly admitted that Volt Typhoon attacks were linked to U.S. support for Taiwan. It's the first time Beijing has acknowledged involvement.

FBI teams found Volt Typhoon malware lurking in critical systems for at least five years. Salt Typhoon compromised at least nine major U.S. telecom providers, including AT&T and Verizon, accessing call records of over a million Americans and wiretapping phones belonging to presidential campaign staff. Salt Typhoon also breached the Treasury Department in December, accessing unclassified documents from Secretary Yellen's workstation.

FBI Director Christopher Wray told Congress that Chinese cyber operatives outnumber FBI cyber personnel 50 to 1. U.S. officials admit they still cannot fully eradicate the hackers from compromised networks. Taiwan reported cyberattacks doubled to 2.4 million daily in 2024, with coordinated strikes timed to Chinese military drills.

Key Indicators

50:1
Chinese hackers vs. FBI cyber personnel
FBI Director Wray's estimate of the numerical advantage Chinese cyber operators hold over US defenders
600+
China's operational nuclear warheads
Pentagon estimates arsenal will exceed 1,000 by 2030, part of broader military modernization
9+
US telecom companies compromised
Salt Typhoon accessed AT&T, Verizon, T-Mobile, and at least six others; ninth victim disclosed Dec 2024
2027
China's Taiwan invasion readiness target
Pentagon reports PLA aims to achieve capability for 'strategic decisive victory' over Taiwan
$11B
Recent US arms sales to Taiwan
December 2024 package includes HIMARS, drones, and howitzers; $21.5B backlog remains undelivered
2.4M
Daily cyberattacks on Taiwan
Taiwan's National Security Bureau reports attacks doubled in 2024, with China responsible for most

Voices

Curated perspectives — historical figures and your fellow readers.

Ever wondered what historical figures would say about today's headlines?

Sign up to generate historical perspectives on this story.

Play

Exploring all sides of a story is often best achieved with Play.

Log in to play. Track your picks, climb the leaderboards. Log in Sign Up
Predict 4 ways this could play out. Contrarian picks score more — points lock when the scenario resolves. Log in to play
Timeline Five events from this story — drag them oldest to newest. Log in to play
Connections Sixteen names from the news. Find the four hidden groups of four. Log in to play

People Involved

Organizations Involved

VT
Volt Typhoon
State-sponsored hacking group (China)
Active since at least 2021, ongoing threat to US infrastructure

Chinese state-sponsored hacking group embedding malware in US critical infrastructure to enable wartime disruption, not espionage.

ST
Salt Typhoon
Advanced Persistent Threat Group
Active since 2022, still embedded in US telecom networks as of late 2024

Chinese espionage group that compromised nine US telecommunications companies, accessing call metadata and audio of high-profile targets.

Cybersecurity and Infrastructure Security Agency (CISA)
Cybersecurity and Infrastructure Security Agency (CISA)
Federal Agency
Lead agency for critical infrastructure cybersecurity defense

Federal agency responsible for protecting US critical infrastructure from cyber and physical threats.

U.S. Department of Defense
U.S. Department of Defense
Federal department
Publishing annual assessments of Chinese military capabilities

Cabinet department overseeing US military, tracking Chinese military modernization and cyber threats.

Silk Typhoon
Silk Typhoon
State-sponsored hacking group (China)
Linked to December 2024 Treasury Department breach

Chinese hacking group linked to the December 2024 Treasury Department breach that accessed unclassified documents from senior officials.

Sichuan Juxinhe Network Technology Co.
Sichuan Juxinhe Network Technology Co.
Chinese Technology Company (Sanctioned)
Sanctioned by U.S. Treasury on January 17, 2025

Sichuan-based cybersecurity firm sanctioned for direct involvement in Salt Typhoon telecommunications breaches.

TN
Taiwan National Security Bureau
Government Intelligence Agency
Reporting surge in Chinese cyberattacks against Taiwan

Taiwan's primary intelligence agency responsible for national security and counterintelligence.

Timeline

March 2018 January 2025

24 events Latest: January 17th, 2025 · 1 year ago Showing 8 of 24
Tap a bar to jump to that date
  1. Treasury Sanctions Chinese Cyber Company

    Latest Sanctions

    US imposes sanctions on Sichuan Juxinhe Network Technology Co. for direct involvement in Salt Typhoon exploitation of telecommunications and internet service providers.

  2. Taiwan Reports Cyberattacks Doubled in 2024

    Intelligence

    Taiwan's National Security Bureau reports daily cyberattacks jumped from 1.2 million to 2.4 million in 2024, with China's 'cyber force' responsible for most attacks coordinated with military drills near the island.

  3. Outbound Investment Restrictions Take Effect

    Regulation

    Treasury Department's final rule establishing Outbound Investment Security Program goes into force, requiring notification or prohibition of US investments in Chinese sensitive technology sectors.

  4. Pentagon Releases China Military Power Report

    Assessment

    Annual report warns Volt Typhoon cyber operations embedded in US infrastructure aim to disrupt military response during Taiwan crisis. Confirms China expects to achieve invasion capability by 2027 with over 600 nuclear warheads and growing.

  5. Massive $11 Billion Arms Package to Taiwan

    Military

    Trump administration announces one of the largest arms sales in history: 82 HIMARS systems, 420 ATACMS missiles, 60 howitzers, and advanced drones to bolster Taiwan's defense capabilities.

  6. Treasury Department Breach Begins

    Cyber Operations

    Chinese hackers exploit BeyondTrust remote support software to gain access to Treasury Department workstations, accessing unclassified documents from Secretary Yellen and other senior officials.

  7. China Indirectly Admits Volt Typhoon in Geneva Meeting

    Diplomacy

    In secret Geneva meeting, Chinese Foreign Ministry official Wang Lei makes indirect but startling admission linking Volt Typhoon cyberattacks to U.S. support for Taiwan, first acknowledgment of Beijing's involvement.

  8. $385 Million Taiwan Arms Sale Approved

    Military

    Biden administration approves weapons package including F-16 spare parts and support, marking 18th arms deal to Taiwan during his presidency amid intensifying cross-strait tensions.

  9. CISA Chief Calls CrowdStrike Outage 'Dress Rehearsal'

    Statement

    Easterly warns that July's CrowdStrike software update—which grounded flights and crashed hospital systems—previews the chaos China could unleash by targeting infrastructure during conflict.

  10. Five Eyes Joint Advisory Issued

    Intelligence

    US, UK, Canada, Australia, and New Zealand publish coordinated cybersecurity advisory detailing Volt Typhoon tactics and urging critical infrastructure operators to hunt for compromise indicators.

  11. FBI Director Warns Congress of Infrastructure Threat

    Congressional Testimony

    Christopher Wray testifies that Chinese hackers are positioning to 'wreak havoc' on US critical infrastructure during Taiwan conflict. FBI announces court-authorized operation disrupted Volt Typhoon botnet on hundreds of routers.

  12. CISA Director: 'Tip of the Iceberg'

    Congressional Testimony

    Jen Easterly tells lawmakers that Volt Typhoon intrusions found across multiple critical infrastructure sectors represent only a fraction of the threat, warning 'very basic' security flaws enabled penetration.

  13. Biden Issues Outbound Investment Executive Order

    Regulation

    President announces restrictions on US investment in Chinese companies developing sensitive technologies including semiconductors, quantum computing, and artificial intelligence.

  14. Volt Typhoon Publicly Disclosed

    Intelligence

    Microsoft and Five Eyes intelligence agencies publish joint advisory revealing Chinese state-sponsored actors embedded in US critical infrastructure since at least mid-2021.

  15. Sweeping Semiconductor Export Controls

    Regulation

    Commerce Department implements dramatic export restrictions on advanced computing chips and manufacturing equipment to China, aiming to foreclose Beijing's ability to develop cutting-edge semiconductors.

  16. CHIPS Act Signed Into Law

    Legislation

    Biden signs $52 billion semiconductor manufacturing incentive package with restrictions barring recipients from expanding advanced chip production in China for ten years.

  17. Salt Typhoon Telecommunications Campaign Begins

    Cyber Operations

    Chinese hackers begin multi-year operation to penetrate US telecommunications providers, eventually compromising nine major carriers.

  18. Volt Typhoon Campaign Begins (Estimated)

    Cyber Operations

    Chinese state-sponsored hackers begin infiltrating US critical infrastructure systems including energy, water, communications, and transportation networks.

  19. Trump Administration Launches China Trade War

    Economic

    US imposed tariffs on $250 billion of Chinese imports after Section 301 investigation, marking escalation of strategic competition beyond traditional security domains into technology and trade.

Historical Context

3 moments from history that rhyme with this story — and how they unfolded.

2010

Stuxnet: The First Cyber Weapon (2010)

The US and Israel deployed the Stuxnet worm against Iran's Natanz uranium enrichment facility, marking the first cyberattack that caused physical destruction of industrial infrastructure. The sophisticated malware infiltrated air-gapped systems via infected USB drives, altered programmable logic controllers, and destroyed 984 centrifuges by spinning them irregularly. Iran's nuclear program was set back at least a year without a single bomb dropped or missile fired.

Then

Delayed Iranian nuclear weapons development; demonstrated feasibility of cyber-kinetic attacks.

Now

Opened Pandora's box of state-sponsored infrastructure cyberattacks; established precedent nations now invoke to justify offensive operations.

Why this matters now

Stuxnet proved cyberweapons can achieve strategic military objectives without traditional force. Volt Typhoon represents the mirror image: instead of destroying enemy infrastructure, China is pre-positioning to destroy American infrastructure, potentially with far broader civilian impact than Stuxnet's surgical targeting.

1947-1991

Cold War Soviet Espionage and Infrastructure Targeting

Soviet intelligence services conducted extensive espionage operations inside the United States, stealing atomic bomb secrets, infiltrating government agencies, and mapping critical infrastructure. Unlike today's cyber operations, Soviet spies relied on human intelligence networks and attempted to sabotage diplomatic relationships. The KGB's focus on science, technology, and military secrets paralleled current Chinese cyber-espionage priorities, though the methods differed dramatically.

Then

USSR successfully stole nuclear weapons technology, accelerating their atomic bomb program by years.

Now

Espionage rivalry persisted throughout the Cold War; many techniques and intelligence priorities continued into post-Soviet Russian operations.

Why this matters now

Today's US-China competition echoes Cold War dynamics: ideological adversaries, nuclear arsenals, global spheres of influence, and espionage focused on technological advantage. But China's cyber pre-positioning in civilian infrastructure is unprecedented—the Soviets never had the capability to remotely shut down American power plants from Moscow.

December 7, 1941

Pearl Harbor and Homeland Vulnerability (1941)

Japan's surprise attack on Pearl Harbor killed 2,403 Americans, destroyed or damaged 19 ships and 328 aircraft, and shocked a nation that felt protected by two oceans. The attack demonstrated that geographic isolation no longer guaranteed security. It galvanized American entry into World War II and led to massive military mobilization and infrastructure hardening.

Then

US declared war on Japan; suffered temporary Pacific naval superiority loss; faced military mobilization challenges.

Now

Transformed American strategic culture from isolationism to global engagement; established forward military presence as deterrence doctrine.

Why this matters now

Volt Typhoon represents a 21st-century Pearl Harbor scenario: a surprise attack on American homeland infrastructure designed to delay military response during a Pacific conflict. The difference is that Chinese hackers are already inside the target systems, waiting. The attack could begin before the first shot is fired over Taiwan.

Sources

(23)