A recent report from ICS security firm Dragos has unveiled a significant cyber intrusion involving the Chinese hacking group known as Volt Typhoon. This group managed to infiltrate the network of the Littleton Electric Light and Water Departments (LELWD), a modest public power utility in Massachusetts, for an alarming 300 days, highlighting the vulnerabilities in the U.S. electric grid.
The breach was detected in November 2023, just prior to Thanksgiving, revealing that Volt Typhoon had maintained access to LELWD's network since February 2023. "The significance of the discovery of this attack is that it highlights that the adversary not only aimed to maintain persistent access to the victim’s environment for a long tenure, but also were aiming to exfiltrate specific data related to OT operating procedures and spatial layout data relating to energy grid operations," explained Dragos.
Dragos had been working with LELWD to implement operational technology (OT) security solutions when the intrusion was discovered, accelerating the deployment of their systems. This incident stands as a cautionary tale for critical infrastructure entities, emphasizing the importance of proactive cybersecurity measures.

The Volt Typhoon hacking group's activities became widely known in May 2023 when Microsoft revealed that they were targeting U.S. critical infrastructures for espionage purposes. This group is recognized not only for its advanced techniques but also for its ability to utilize botnets and zero-day exploits to infiltrate networks effectively.
Looking Ahead
Dragos's case study indicates that while Volt Typhoon has thus far avoided causing disruptions to industrial control systems (ICS), their capability to collect sensitive operating data poses a serious threat. "Exfiltrated data and persistent access to OT systems could be employed as a means for actions on objectives in the future," Dragos emphasized.
"Exfiltrated data and persistent access to OT systems could be employed as a means for actions on objectives in the future,"
Looking Ahead
In the case of LELWD, analysts tracked how the hackers gathered critical data on OT systems. This kind of information is crucial for a potential escalation of malicious intents, as it empowers adversaries to identify precise points of weakness within the energy grid, thus enhancing their future attack strategies.
Looking Ahead
"This information can be pivotal for helping the adversary know exactly where to attack when, or if, they decide to utilize a Stage 2 capability in the future," the firm explained. Stage 2 of the ICS Cyber Kill Chain refers to the phase where hackers can develop and execute specific attacks on industrial control systems, indicating a dangerous level of sophistication that Volt Typhoon exhibits.
"This information can be pivotal for helping the adversary know exactly where to attack when, or if, they decide to utilize a Stage 2 capability in the future,"

In addition to the LELWD breach, Dragos has noted that the Volt Typhoon group has been observed collecting geographic information system (GIS) data from several other entities, further underscoring the extensive reach and ambition of this threat actor. Such information is significant, as it encompasses critical details about the spatial layout of energy systems, making them more vulnerable to targeted attacks in the future.
As a proactive response to threats like Volt Typhoon, the cybersecurity community is emphasizing the need for improved defenses across the board. "Being aware of these threats is the first step toward mitigating risk, but taking action through better security practices is vital to safeguard critical infrastructure," concluded Dragos.
"Being aware of these threats is the first step toward mitigating risk, but taking action through better security practices is vital to safeguard critical infrastructure,"
The continued vigilance and advanced technologies will be crucial for utilities and critical infrastructure operators as they confront the evolving landscape of cyber threats. The ongoing activities of groups such as Volt Typhoon remind us that the battle against cyber intrusions is far from over, and there is an urgent need for enhanced collaborative efforts in cybersecurity to protect essential services.

