Volt Typhoon, Salt Typhoon & APT41: This is No Longer a Drill 

Download the report here

New threat intelligence confirms what many infrastructure leaders have long feared: Chinese state-sponsored threat groups are not only capable of infiltrating U.S. critical systems—they already have. Volt Typhoon, Salt Typhoon, and APT41 are executing long-term, undetected operations within utilities, transportation networks, telecom platforms, and software supply chains.

These aren’t theoretical threats. This is an active campaign targeting the systems Americans rely on for water, power, safety, and communication.

Download the full threat research report to understand the scope, tactics, and implications of these breaches—and what to do next.

How Volt Typhoon Avoided Detection for Nearly a Year

Volt Typhoon has been active since at least 2021, embedding itself in critical infrastructure providers using tools already present in the environment, like PowerShell, WMI, and command-line utilities. By mimicking legitimate admin activity, they avoid detection by traditional, signature-based security tools.

A Massachusetts utility provider unknowingly hosted Volt Typhoon operators for nearly a year. They gained access via known or zero-day vulnerabilities, escalated privileges, and moved laterally within the network. In Guam, another confirmed breach triggered national concern due to the island’s strategic role in U.S. Navy operations.

Volt Typhoon’s techniques are optimized for stealth, persistence, and access to operational technology (OT) systems, making long-term sabotage a real possibility.


Salt Typhoon’s Hijack of U.S. Telecom Surveillance Systems

In 2024, Salt Typhoon was found inside the systems of nine major U.S. telecom companies. These weren’t just standard breaches—they penetrated lawful intercept platforms, which are used to comply with federal surveillance orders. In effect, Salt Typhoon gained access to tools meant for law enforcement and turned them against U.S. citizens and government officials, including then-President-elect Donald Trump.

This group leveraged a complex toolkit, including BITSAdmin, CertUtil, SparrowDoor, and PowerShell-based scripts, while disguising command-and-control traffic as regular activity.

Download the full report for a complete breakdown of Salt Typhoon’s tactics and the risks to national surveillance integrity.

APT41: State Espionage Meets Profit-Driven Cybercrime

APT41 stands apart due to its dual mission: conducting government espionage while also executing financially motivated attacks. Known as Brass Typhoon and Wicked Panda in various contexts, this group has compromised software development pipelines, healthcare providers, and cloud-based platforms.

Their toolkit is extensive, ranging from DNS-based C2 channels to obfuscated PowerShell payloads, and from exploiting VPN appliances to deploying persistence mechanisms inside developer environments. They are one of the few groups actively targeting both operational infrastructure and commercial entities.

Their use of signed binaries, stealthy lateral movement, and obfuscation techniques continues to challenge legacy detection tools.

The Lag in U.S. Infrastructure Defense

PRC threat actors are outpacing U.S. critical infrastructure cybersecurity capabilities—not just in tools, but in agility. Procurement delays, slow patching cycles, and legacy compliance systems are hampering our ability to respond. Meanwhile, attackers are using AI to rewrite malware on demand and test defenses with speed.

At the same time, many infrastructure systems still rely on tools that can only detect threats with known signatures, rendering them ineffective against low-and-slow campaigns that evolve in real time.

The threat actors are already inside. The question now is whether organizations can identify and contain them before real-world impacts occur.


MixMode’s Approach to Detecting PRC-Backed Intrusions

MixMode was designed to detect the undetectable. Unlike tools that rely on known indicators, MixMode uses real-time, unsupervised AI to establish and evolve behavioral baselines unique to each environment. It observes networks passively and out-of-band, without relying on traditional querying or scanning.

This makes MixMode especially effective at identifying:

  • Vendor login anomalies and reconnaissance linked to Volt Typhoon
  • Irregular encrypted traffic suggesting certificate misuse by Salt Typhoon
  • Unusual developer activity and credential elevation patterns tied to APT41
  • Protocol misuse or OT credential compromise not flagged by legacy tools

Because MixMode doesn’t rely on rules or CVEs, it can detect novel threats, zero-days, and new techniques as they emerge, not after the fact.

Recommendations for Infrastructure Leaders

To reduce exposure to these threats, the report outlines critical steps for infrastructure organizations:

  • Separate IT and OT systems physically or through air gaps
  • Enforce multifactor authentication, especially for vendor and privileged accounts
  • Eliminate privileged credentials stored on endpoints
  • Deploy continuous behavioral monitoring tools with proven success against APT tactics
  • Conduct regular access audits, review session logs, and establish strict time-based access controls
  • Upgrade or isolate legacy systems that can no longer be patched

Download the full report for detailed architecture recommendations and technology strategies tailored to high-risk sectors.

Technology Must Catch Up—Now

Download the report here.

Chinese APT groups have proven they can maintain long-term, undetected access inside U.S. infrastructure systems. They are stealthy, resourced, and far ahead in adopting AI-driven cyber techniques. Their goals are not limited to reconnaissance—they include the ability to disable infrastructure on demand.

MixMode was purpose-built to detect the types of threats described in this report. With passive, real-time detection across both IT and OT systems, MixMode gives infrastructure defenders a critical edge—identifying attacks early and responding before systems are compromised.

Download the full report: Volt Typhoon, Salt Typhoon & APT41—This Is No Longer a Drill. Understand what’s already happened. See what’s coming next. Equip your team to respond.