Volt Typhoon Living Rent-Free in US Power Grids While Xi Purges Generals and Hunts CIA Spies

Volt Typhoon Living Rent-Free in US Power Grids While Xi Purges Generals and Hunts CIA Spies

4:05 Feb 22, 2026
About this episode
This is your Cyber Sentinel: Beijing Watch podcast.Hey listeners, Ting here on Cyber Sentinel: Beijing Watch, diving straight into the pulse-pounding cyber chaos from China's hackers this past week. Picture this: I'm hunkered down in my digital war room, caffeine-fueled, watching Volt Typhoon— that sneaky Chinese state-sponsored crew—still burrowed deep in America's power grids and water plants like uninvited guests who won't leave. Dragos dropped their Year in Review report on February 19th, and CEO Rob Lee laid it bare: these guys have been embedding since 2021, mapping utilities from Massachusetts' Littleton Electric Light and Water Departments—where they lurked 300 days, snagging grid layouts and sensor data via firewall exploits—to oil pipelines and telecoms across NATO allies. No ransomware flash; it's all "living off the land" with PowerShell and legit admin tools, now escalating to tweak operational tech like industrial controllers. Their endgame? Pre-position for sabotage if Taiwan heats up, crippling U.S. military moves by blacking out power and water.Tactics evolved slickly: SYLVANITE broaches via Ivanti VPN holes, hands off to Volt Typhoon for the long haul. Meanwhile, Google’s threat intel and Mandiant nailed China-linked espios exploiting a Dell zero-day, CVE-2026-22769, since mid-2024 in RecoverPoint software—deploying BRICKSTORM backdoors and SLAYSTYLE webshells for stealthy network squats. Automotive's next: Upstream Security's 2026 report flags ransomware doubling to 44% of 494 incidents last year, hammering cloud telematics—easy prey since fleets run identical software stacks. Yigal Unna, ex-Israel Cyber Directorate head, warns it's a "pandemic waiting to outbreak." Indo-Pacific ripple: UNC3886 hit Singapore's infra, per OpFor Journal's February 21 weekly.Targeted industries? Critical infra screams loudest—energy, water, transport, now autos and defense contractors via corporate espionage, as Eurasia Review exposed China's dual cyber play: steal high-tech secrets while Beijing fortifies. Attribution's ironclad from U.S. intel, linking to PLA via tactics and timing. Internationally, UAE foiled 128 attacks on vital sectors by February 18, Taiwan's Taipei Grand Hotel got hit February 22nd probing data theft, and CISA/FBI advisories echo the panic.Tactically, it's stealth persistence; strategically, it's geopolitical judo—build sabotage muscle in peacetime while Xi's crew purges PLA brass like Zhang Youxia amid CIA's Mandarin spy-recruit vids, sparking MSS hotline rewards and AI counter-mockery. Beijing's beefing Anti-Espionage Law, scanning devices, shielding AI/BCI tech racing past Neuralink with NeuroXess leads.Defend smart: Mandate OT monitoring for small utils, hunt LOTL with behavior analytics, patch Ivanti/Dell pronto, segment cloud-to-vehicle pipes, and share IOCs via CISA. Feds, fund rural cyber; industry, baseline UNECE WP.29 standards. We're compromised—live wit
Select an episode
0:00 0:00