<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Volt Typhoon]]></title><description><![CDATA[This section examines how the Volt Typhoon narrative developed over time, from initial threat intelligence findings to public government statements and China’s subsequent responses, highlighting what each disclosure revealed and which uncertainties persist.]]></description><link>https://www.nattothoughts.com/s/volt-typhoon</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Volt Typhoon</title><link>https://www.nattothoughts.com/s/volt-typhoon</link></image><generator>Substack</generator><lastBuildDate>Fri, 15 May 2026 14:40:34 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Who is Volt Typhoon? A State-sponsored Actor? Or Dark Power?]]></title><description><![CDATA[Cyber attribution is complicated. After all the publicity about Volt Typhoon as a Chinese state hacking group, we have more questions than answers.]]></description><link>https://www.nattothoughts.com/p/who-is-volt-typhoon-a-state-sponsored</link><guid isPermaLink="false">https://www.nattothoughts.com/p/who-is-volt-typhoon-a-state-sponsored</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 12 Jun 2024 16:00:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4OdI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef5bd4b-aadd-409a-8233-99ee4291e6a1_934x516.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Revelations about the Volt Typhoon hacking group&#8217;s targeting of US critical infrastructure shows Chinese cyber operations have permanently altered the cyberthreat landscape, <a href="https://therecord.media/cyberthreat-landscape-altered-chinese-operations">US officials said</a> at the RSA cybersecurity conference in early May. &nbsp;&#8220;China has moved beyond the traditional goal of nation-state hacking operations &#8211; spying on an adversary &#8211; into something more sinister.&#8221; If we recall, this was not the first time this year that US officials have called out the significance of Volt Typhoon campaigns. At the end of January, after the US Department of Justice (US DoJ) took down a botnet allegedly used by Volt Typhoon, <a href="https://selectcommitteeontheccp.house.gov/committee-activity/hearings/hearing-notice-ccp-cyber-threat-american-homeland-and-national-security">US officials pointed out</a> that China&#8217;s &#8220;historical focus on stealing state secrets and espionage,&#8221; meaning cyber espionage for political and economic interests, has evolved into a more ominous intention to prepare for destructive attacks. As US officials said, Volt Typhoon campaigns <a href="https://www.axios.com/2024/01/31/china-cyber-threats-congressional-hearing">show</a> &#8220;a new interest in preparing and launching destructive cyberattacks against US ele&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/who-is-volt-typhoon-a-state-sponsored">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[When “Volt Typhoon” Blows Over: Cases of China’s Offensive Cyber Operation ]]></title><description><![CDATA[Are China&#8217;s threat campaigns in preparing and pre-positioning for potential offensive activity really &#8220;a new interest&#8221;?]]></description><link>https://www.nattothoughts.com/p/when-volt-typhoon-blows-over-cases</link><guid isPermaLink="false">https://www.nattothoughts.com/p/when-volt-typhoon-blows-over-cases</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Fri, 09 Feb 2024 02:31:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FAja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FAja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FAja!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FAja!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FAja!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FAja!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FAja!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg" width="720" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114810,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FAja!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FAja!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FAja!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FAja!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccabc3f4-7fbd-48a9-8e26-ab8b53e24066_720x480.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://www.flickr.com/photos/68824346@N02/21830135771/">NASA Earth Observatory</a></figcaption></figure></div><p>Last Wednesday, January 31, a <a href="https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical">press release</a> from the United State Department of Justice stated the US government has taken down a botnet used by <strong>Volt Typhoon</strong>, a Chinese state-sponsored advanced persistent threat (APT) group targeting US critical infrastructure. In testimony before a committee of the US House of Representatives, FBI director Chris Wray <a href="https://www.pbs.org/newshour/politics/chinese-hackers-are-determined-to-wreak-havoc-on-u-s-critical-infrastructure-fbi-director-wray-warns">warned</a> &#8220;Chinese government hackers are busily targeting water treatment plants, the electrical grid, transportation systems and other critical infrastructure inside the US,&#8221; &#8230; &#8220;in preparation to wreak havoc and cause real-world harm to American citizens and communities&#8230;&#8221; </p><p>The state-backed Chinese threat group Volt Typhoon first came to public attention in May 2023 when <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Microsoft reported</a> the group&#8217;s &#8220;stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the US.&#8221; Microsoft assessed the &#8220;Volt Typhoon c&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/when-volt-typhoon-blows-over-cases">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>