Researchers warn Volt Typhoon still embedded in US utilities and some breaches may never be found
嗯,用户让我用中文帮他总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。我先看看这篇文章讲的是什么。 文章主要讲的是美国军方和执法部门花了近三年时间打击入侵水力和电力公司的黑客,但新的报告指出很多攻击可能永远无法被发现。Dragos公司的报告提到中国黑客组织Volt Typhoon持续攻击美国关键基础设施,并且很难被完全清除。特别是水力等公共事业可能无法检测到这些威胁,导致基础设施长期被渗透。此外,还有另一个组织SYLVANITE帮助Volt Typhoon获取初始访问权限。 我需要把这些关键点浓缩到100字以内。首先说明美国的行动和问题,然后提到Volt Typhoon的情况,以及SYLVANITE的作用。最后点出威胁难以根除。 可能会这样写:“美国军方和执法部门三年来致力于打击入侵关键基础设施的黑客,但新报告指出许多攻击可能无法被发现。中国黑客组织Volt Typhoon持续攻击美国公用事业,并通过SYLVANITE获取初始访问权限。这些威胁难以被检测和清除,导致部分基础设施长期受威胁。” 检查一下字数,刚好在100字左右,符合要求。 </think> 文章描述了美国军方和执法部门三年来致力于打击入侵关键基础设施的黑客,但新报告指出许多攻击可能无法被发现。中国黑客组织Volt Typhoon持续攻击美国公用事业,并通过SYLVANITE获取初始访问权限。这些威胁难以被检测和清除,导致部分基础设施长期受威胁。 2026-2-19 21:0:57 Author: therecord.media(查看原文) 阅读量:3 收藏

U.S. military and law enforcement officials have been on a dedicated mission for nearly three years to uncover and root out hackers who breached water and power companies in key locations across the country. But a new report suggests that many of these attacks on U.S. critical infrastructure may never be found.

Operational technology firm Dragos, which has helped multiple critical infrastructure organizations investigate compromises by Chinese hackers connected to the Volt Typhoon operation, said in its annual report published this week that the group continued to attack U.S. utilities through 2025 and remains active despite increased scrutiny.

Rob Lee, the company’s chief executive, told reporters last week that “they're still very active, and they're still absolutely mapping out and getting into embedding in U.S. infrastructure, as well as across our allies.” 

When asked by Recorded Future News whether Volt Typhoon could ever fully be removed from all U.S. utilities that have been attacked so far, Lee said there are sites compromised by the group in the U.S. and in NATO countries that “we will never find.”

The group’s goal, according to U.S. authorities, is to pre-position hackers on operational technology networks so destructive cyberattacks could be launched in an effort to slow any U.S. military mobilization. Lee said they focus on strategically important targets and find ways to maintain long-term access.

Lee noted that many of the regulations being issued by the U.S. government over the next three to five years will help companies find Volt Typhoon compromises. Several of the largest electricity companies currently do have the ability to find and root out Volt Typhoon actors. 

But for other critical public utilities that are being attacked, like those in the water sector, it is likely they will never reach the level of sophistication where they would be able to find and remove Volt Typhoon compromises. 

“Is it possible to go look in those companies? Sure it is. Are they ever going to get there? No, not at all. In my assessment…we're going to have to live with the reality that a portion of our infrastructure is currently compromised and will remain compromised at the current trajectory of the community.”

China has denied any involvement in the Volt Typhoon compromises but evidence of Volt Typhoon hackers was found hidden in U.S. critical infrastructure in Guam and near other U.S. military bases with the intent of slowing any potential mobilization of forces. 

The total number of Volt Typhoon victims is unknown and, when pressed, U.S. officials said any number given “is likely an underestimate.”

SYLVANITE handoffs

Dragos researchers also highlighted another group they said gained initial access to utilities before handing it off to Volt Typhoon for further activity. 

That group, which Dragos calls SYLVANITE, was seen targeting operational technology systems across North America, Europe, South Korea, Guam, the Philippines and Saudi Arabia. The group gained initial access to organizations in the oil and gas, water, power generation, transmission and manufacturing industries.

“In other words, this is not the team that's going in and causing an effect. It's not the team trying to gain long term access but it is a team working with or for [Volt Typhoon] that is going and developing the access, getting them in, knocking down the door to hand it over to [Volt Typhoon,” Lee said. 

Dragos experts attributed several recent high-profile vulnerability exploitation campaigns to Volt Typhoon and SYLVANITE, including bugs involving widely-used tools from Ivanti and Trimble Cityworks GIS asset management software. The federal cyber defense agency ordered all agencies to immediately patch the Trimble Cityworks bug one year ago and cybersecurity firms later confirmed that Chinese hackers used it to breach multiple local governments

Dragos said the breaches gave Volt Typhoon hackers access to data that enables “adversaries to plan precise, disruptive attacks on electric and water utilities.”

“U.S. based utilities and municipalities often rely on GIS data for infrastructure operations, but this information can be weaponized by adversaries for future ICS intrusions,” Dragos said. 

Throughout 2025, Volt Typhoon’s operations “reflect a shift toward not only collecting and exfiltrating data from IT networks but also directly interacting with OT network-connected devices and stealing sensor and operational data,” Dragos said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure
如有侵权请联系:admin#unsafe.sh