2026-03-20 | APT Groups and Nation-State Actors | Oracle-42 Intelligence Research
```html

Volt Typhoon’s Silent Pre-Positioning in Critical Infrastructure: A Long-Term Threat to Global Stability

Executive Summary: In late January 2026, cybersecurity researchers uncovered a coordinated campaign by Volt Typhoon—a state-sponsored advanced persistent threat (APT) group affiliated with the People’s Republic of China—targeting critical infrastructure across North America, Europe, and Asia. The campaign, codenamed Operation Silent Watch, involves the pre-positioning of custom malware and backdoors in ICS/SCADA systems, residential proxy networks such as IPIDEA, and exposed AI inference servers (e.g., Ollama deployments). This article analyzes the geopolitical and technical implications of Volt Typhoon’s activities, evaluates the role of RPKI in mitigating routing-based attacks, and provides actionable recommendations for governments and private sector stakeholders.

Key Findings

Background: The Volt Typhoon Threat Profile

Volt Typhoon, first identified in 2023, operates under the strategic direction of China’s Ministry of State Security (MSS) and the People’s Liberation Army Strategic Support Force (PLASSF). Unlike other APT groups that focus on espionage or intellectual property theft, Volt Typhoon prioritizes pre-positioning—establishing undetectable footholds in critical systems to enable future sabotage, espionage, or coercive leverage during geopolitical crises. This doctrine is codified in China’s 2020 Military Strategy, which emphasizes “informatized warfare” and “asymmetric advantages” in cyberspace.

Recent disclosures by Microsoft, CrowdStrike, and CISA indicate that Volt Typhoon has extended its reach beyond traditional IT networks into operational technology (OT) environments, using living-off-the-land techniques and abusing legitimate system tools such as PowerShell and WMI to evade detection.

Infrastructure Abuse: IPIDEA Proxies and Exposed AI Servers

In January 2026, researchers at Oracle-42 Intelligence and partners at GreyNoise revealed that IPIDEA—one of the largest residential proxy networks, with over 10 million IPs—had been heavily infiltrated. Threat actors are using IPIDEA nodes to:

Simultaneously, the rapid proliferation of AI inference servers—particularly those running Ollama, a lightweight open-source framework for local LLM deployment—has created a new attack surface. A scan conducted by Oracle-42 Intelligence found 175,000 publicly exposed Ollama instances, with China hosting the largest share. Many of these servers are misconfigured, running with default credentials or exposed Docker APIs, enabling:

BGP Vulnerabilities and the Role of RPKI

Volt Typhoon’s operations are further enabled by systemic weaknesses in the Border Gateway Protocol (BGP), the routing backbone of the Internet. BGP lacks built-in authentication, making it susceptible to route hijacking, IP spoofing, and man-in-the-middle (MITM) attacks. These vulnerabilities allow adversaries to:

The Resource Public Key Infrastructure (RPKI) framework offers a cryptographic solution to BGP vulnerabilities by validating route announcements through digital certificates. However, adoption remains alarmingly low:

Without widespread RPKI deployment, Volt Typhoon can continue to abuse BGP to maintain persistence, exfiltrate data, and even trigger false flag operations by rerouting traffic through third-party networks.

Geopolitical and Operational Impact

The scale and persistence of Volt Typhoon’s campaign suggest a deliberate strategy to create “cyber tripwires” in critical infrastructure. Analysts assess that China is preparing for potential future contingencies—such as a Taiwan Strait conflict—where rapid denial-of-service or sabotage operations could be launched with minimal warning.

Moreover, the integration of AI infrastructure into this campaign introduces a new dimension: AI-enabled cyber operations. Exposed Ollama servers could be used to:

Recommendations for Stakeholders

To counter Volt Typhoon’s pre-positioning activities and strengthen global cyber resilience, the following measures are recommended:

For Governments and Regulators

For Critical Infrastructure Operators

For Network and Cloud Providers

For the Private Sector and Civil Society