Skip to content

Case study reveals Chinese hackers spent over 300 days in US electricity grid

  • by
  • 2 min read

A new study into a cyberattack at the Littleton Electric Light and Water Departments (LELWD), a public power utility in Massachusetts serving Littleton and Boxborough, has revealed the threat actor behind the attack. The malicious activity has been attributed to Chinese threat actor Volt Typhoon.

The study, published by cybersecurity firm Dragos, claims that while the LELWD breach was discovered in November 2023, the hackers had been in the organisation’s network since at least February 2023—for over 300 days in total. The group’s existence came to light in May 2023 when Microsoft caught it targeting US critical infrastructures and linked it to the Chinese governments.

In the case of LELWD, hackers were found collecting data on OT systems, something it had been doing to hacked organisations for a while. The group is also known for its rampant use of botnets, zero-days, and overall attack sophistication.

This is an image of cyber security hacked hacking 3889

With the threat actor’s ability to maintain persistence discovered, Dragos is now looking to extract information on how the group operates. Specifically, data related to OT operating procedures and any spatial layout data relating to energy grip operations. Dragos believes this information helps the group decide exactly when and where to attack. Additionally, this data might also help determine if they want to use a Stage 2 capability in the future.

Stage 2 capability in hacking groups that targeted industries indicated that the adversary can develop and test attacks of industrial control systems. Dragos tracks several other actors apart from Volt Typhoon who possess such capabilities. While the security firm hasn’t spotted Volt Typoon, otherwise tracked as Voltzite attacking ICS systems yet, it could pose a threat in the future.

In the News: Match Group, AIDF denied Apple’s confidential antitrust data

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: yadullahabidi@pm.me.

>