Ting Spills the Tea: China's Volt Typhoon Is Camping in US Power Grids and Nobody's Kicking Them Out
09 February 2026

Ting Spills the Tea: China's Volt Typhoon Is Camping in US Power Grids and Nobody's Kicking Them Out

Red Alert: China's Daily Cyber Moves

About
This is your Red Alert: China's Daily Cyber Moves podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking chaos. Buckle up, because the past few days have been a red-hot frenzy of Chinese cyber ops laser-focused on US turf—think Volt Typhoon burrowing deeper into our critical infrastructure like a digital mole on steroids.

Flash back to February 3rd: China-linked Lotus Blossom hackers compromised Notepad++'s hosting infrastructure, slipping in a sneaky backdoor called Chrysalis to snag users worldwide, per Rapid7's intel. By February 4th, Amaranth-Dragon—tied to APT41—exploited a WinRAR flaw for espionage hits on Southeast Asian govs and cops, but the pattern screams US adjacency. Fast-forward to February 6th: DKnife, a China-nexus adversary-in-the-middle framework active since 2019, per Cisco Talos, hijacks routers for traffic manipulation and malware drops—perfect for blending into US edge networks.

Today, February 9th, the International Institute for Strategic Studies drops a bombshell via John Bruce: Volt Typhoon isn't just spying; it's pre-positioning for disruption. This APT group's embedded in US comms, energy, transport, and gov systems—Guam ports and air bases especially, priming for a Taiwan crisis. They "live off the land," abusing legit admin tools and hijacking SOHO routers to masquerade as normal traffic, dodging detection. IISS warns it's redrawing cyber norms, thumbing its nose at UN Norm 13(f) against impairing critical infrastructure.

No fresh CISA or FBI emergency alerts today, but CISA's February 6th directive mandates federal agencies ditch unsupported edge devices in 12-18 months—direct counter to Volt Typhoon's playbook. House panels are pushing bills to reauthorize ETAC, targeting Volt and Salt Typhoon in energy grids, as Rep. Evans stressed.

Timeline's tight: persistence post-remediation shows they're hunkered down. Escalation? A Taiwan flare-up could flip espionage to blackouts—US naval ops crippled, per IISS. Defend now: Hunt living-off-the-land with behavioral analytics, segment OT networks, patch SolarWinds Web Help Desk (CISA's KEV list), and push "defend forward" ops like the 2018 Cyber Strategy.

China's flexing parity with the West, sowing doubt on our cyber edge. Stay vigilant, listeners—scan those routers, enforce zero trust.

Thanks for tuning in—subscribe for more cyber scoops! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI