2026 Futuriom 50: Highlights →Explore

Executive Summary

Between 2021 and 2026, PRC-affiliated threat actors executed the most consequential cyber espionage campaign in recorded history — not through sophistication alone, but through operational patience, institutional coordination, and systematic exploitation of trusted infrastructure.

The defining shift: China moved away from noisy, tool-heavy intrusions (2016–2020 vintage) toward a model where the attack surface is the infrastructure itself — edge devices, cloud identity systems, hypervisors, and telecommunications backbone. By 2025, PRC actors weren't breaking into networks from outside; they were living inside the fabric of enterprise connectivity.

However, effective defense in 2026 requires understanding how PRC cyber tradecraft evolved from 2021 onward, not just reacting to current headlines.

The most important defensive insight:

The techniques used in 2026 were built incrementally through campaigns executed between 2021 and 2025.

This article analyzes that progression and translates it into concrete detection and defensive strategy guidance.

Detection & Strategy DisclaimerThe thresholds and detection logic in this document are illustrative, not prescriptive. Values such as replay windows, exfil size limits, burst timing, or file modification rates must be tuned to your environment. Network design, workforce geography, cloud setup, logging depth, and normal user behavior all affect what is "anomalous." There is no universal threshold — only environment-calibrated detection.


Strategic Context: Why It Matters to Defenders

China's cyber operations are not opportunistic — they are doctrine-driven and institutionally coordinated.

PRC cyber strategy follows a long-horizon intelligence model: pre-position access during peacetime, collect strategically, and maintain the option for disruption during crisis.

Understanding the doctrinal arc helps you anticipate what attack surfaces will be targeted next and where to invest detection before exploitation occurs.

Strategic Shift

PRC cyber operations transitioned from bulk exploitation (ProxyLogon-era mass collection) to infrastructure-as-implant — embedding capabilities inside edge devices, cloud identity systems, hypervisors, and telecom backbone equipment that defenders cannot inspect with traditional endpoint tools.

The trajectory is clear: the implant is becoming the infrastructure itself.

Operational Implication for SOC & Threat Hunters

Geopolitical flashpoints between Washington and Beijing are no longer abstract policy issues—they are direct, early-warning triggers for People's Republic of China (PRC) state-sponsored cyber operations.


Part I — Strategic Pattern (2021 → 2026)

PRC cyber operations from 2021–2026 show four consistent characteristics:

  • Operational patience — dwell times measured in years, not days

  • Infrastructure-level targeting — edge devices, cloud identity, hypervisors, telecom backbone

  • Minimal tooling footprint — living-off-the-land on network devices; no custom malware to detect

  • Institutional coordination — multiple units (MSS, PLA, contracted groups) with distinct mandates but shared access infrastructure

The tactical stack evolved dramatically, but the doctrine remained consistent:

  1. Gain access below visibility of endpoint tools

  2. Persist through patching and remediation

  3. Collect intelligence at scale

  4. Maintain disruption option for future crisis

What Changed in PRC Cyber Operations (2021–2026)

1. Mass Exploitation Gave Way to Surgical Infrastructure Compromise

ProxyLogon (2021) saw HAFNIUM exploit 400,000+ Exchange servers indiscriminately. By 2024–2025, Salt Typhoon was surgically embedded inside US telecom carriers for 12+ months before detection — accessing CALEA wiretap systems to read US law enforcement surveillance feeds.

Defensive takeaway: Volume-based detection that worked against ProxyLogon-era attacks will miss Salt Typhoon-style operations entirely. Detection must shift to behavioral anomalies on infrastructure devices.

2. Cloud Identity Became the Primary Attack Surface

Storm-0558 (2023) forged Azure AD tokens using a stolen Microsoft consumer signing key — accessing ~25 government organizations' email without triggering any authentication event. The compromise occurred at the provider level, not the customer level.

Defensive takeaway: Your cloud security controls are downstream of a trust relationship with the provider. Monitor for mail access without corresponding sign-in events. M365 E5 UAL logging is not optional for high-risk organizations.

3. Edge Device Implants Designed for Decade-Scale Persistence

SPAWN (2025) was not a traditional implant — it was an implant ecosystem built to survive firmware re-flash, factory reset, and legitimate security patches on Ivanti devices. SPAWNANT patches the upgrade mechanism itself to re-inject malware during legitimate updates.

Defensive takeaway: Standard IR playbooks (isolate → patch → restore) do not work against SPAWN. Hardware replacement is the only guaranteed remediation.

4. Hypervisor Targeting as Domain-Equivalent Access

BRICKSTORM (2022–2025) targeted VMware vCenter/ESXi — one compromised hypervisor provides access to every VM on that host, regardless of guest OS patching, EDR coverage, or network segmentation.

Defensive takeaway: ESXi hosts should be treated as Tier 0 assets (equivalent to domain controllers). VIB installations, SSH access, and VM clone events require active monitoring.

5. Pre-Positioning for Future Disruption

Volt Typhoon maintained access to US critical infrastructure (energy, water, transport) using exclusively living-off-the-land techniques — no custom malware, no suspicious traffic, no network anomalies. The strategic goal: maintain persistent access as a deterrence and wartime disruption capability.

Defensive takeaway: Volt Typhoon-style pre-positioning has near-zero detection profile with conventional tools. Network segmentation, identity hygiene, and edge device integrity verification are the primary controls.


Current Target Prioritization

PRC targeting operates on strategic intelligence priorities:

Priority Tier

Target Category

Rationale

Tier 1

US defense, aerospace, national security, advanced technology

Direct intelligence collection for military/tech parity

Tier 1

US/global telecommunications carriers

Backbone-level signals intelligence (Salt Typhoon model)

Tier 2

US critical infrastructure (energy, water, transport)

Pre-positioning for crisis-time disruption (Volt Typhoon)

Tier 2

Government cloud environments (M365, Azure AD)

Executive/diplomatic communications access

Tier 2

Managed service providers (MSPs)

Supply chain access to downstream targets

Tier 3

Taiwan-adjacent organizations, AUKUS partners

Regional intelligence priorities

Tier 3

Research institutions, think tanks, universities

Technology and policy intelligence

Detection Posture Adjustment

The following priorities should be elevated for any organization in Tier 1 or Tier 2:

  • Edge device integrity verification — Ivanti, Fortinet, Cisco, Juniper appliances in your environment should be checked against vendor ICT tools and known-good baselines. Any unpatched device is an active target.

  • Hypervisor audit — Review all ESXi VIB installations, SSH access logs, VM clone events, and startup scripts. Unauthorized VIB with CommunitySupported acceptance = immediate investigation.

  • M365 UAL monitoring — Mail access (MailItemsAccessed) without corresponding sign-in events from the same IP/AppId is the definitive Storm-0558-style indicator. Requires E5 licensing.

  • Telecom/ISP anomaly detection — For telecom sector: audit all Cisco IOS-XE management interface access, policy-based routing changes, and CALEA system access logs.

  • ORB network awareness — Outbound HTTPS connections to residential ISP IP ranges with long duration and no associated domain = potential Operational Relay Box (ORB) C2.


Threat Actor Landscape

CrowdStrike Name

Microsoft Name

Common Name

Primary Mission

Primary Targets

HAFNIUM

HAFNIUM

Intellectual property theft

US Defense, Research, Think Tanks

WARP PANDA

Defense/Aerospace espionage, hypervisor persistence

Defense contractors, NATO allies, VMware environments

HOLLOW PANDA

Hypervisor persistence

Virtualized enterprise infrastructure

VAULT PANDA

APT41

APT41/BARIUM

Dual espionage + cybercrime

Healthcare, Gaming, Telecom, Gov

OPERATOR PANDA

APT10/Stone Panda

MSP/supply chain

Managed service providers globally

MURKY PANDA

Salt Typhoon/UNC5221

Telecom/ISP infiltration

US/Global telecom carriers

Storm-0558 (Antique Typhoon)

Cloud identity compromise

Government email (US/EU)

Volt Typhoon

Pre-positioning (critical infra)

Energy, Water, Transport, Comms

Key distinction: PRC operates units across MSS (Ministry of State Security), PLA (People's Liberation Army), and contracted private groups, with different mandates:

  • MSS units (APT41, APT10, Storm-0558): Intelligence collection, technology theft, both state-tasked and moonlighting financially-motivated operations

  • PLA/strategic units (Salt Typhoon, Volt Typhoon): Infrastructure access, pre-positioning, signals intelligence — patient, low-noise, long-duration

  • IRGC-equivalent contractors: Groups like UNC5221 that operate semi-independently, targeting edge devices with zero-day exploitation

Attribution note: Attribution between groups is fluid. APT41/VAULT PANDA operates with state sanction but conducts financially-motivated operations on the side — making them uniquely dangerous as they maintain operational tempo even without direct state tasking.


Part II — Campaign Evolution Analysis (2021–2026)

2021: Volume and Velocity (ProxyLogon Era)

  • Characteristic: Mass exploitation of internet-facing services with web shell implants

  • Tooling: China Chopper, custom ASPX web shells, open-source tools (Mimikatz, Cobalt Strike)

  • Detection profile: HIGH — web shells are detectable, tool signatures are known, network traffic is noisy

  • Defining campaign: ProxyLogon — HAFNIUM weaponized 0-days at nation-scale within 72 hours; 400,000+ Exchange servers exposed; at least 10 threat groups adopted exploit within days

2022–2023: Identity and Stealth (Storm-0558 Era)

  • Characteristic: Cloud identity exploitation, token forgery, API-based mail access

  • Tooling: Custom token generation, legitimate Microsoft Graph/EWS APIs

  • Detection profile: LOW — no malware, no web shells, uses legitimate Microsoft APIs with valid tokens

  • Defining campaign: Storm-0558 — forged Azure AD tokens using stolen MSA consumer signing key; accessed ~25 government organizations' email; no authentication events generated

2023–2025: Infrastructure as Implant (Salt Typhoon / SPAWN Era)

  • Characteristic: Compromise the network infrastructure itself; implants that outlast IR response

  • Tooling: Custom firmware implants (SPAWN ecosystem), network traffic interception, BRICKSTORM hypervisor backdoor

  • Detection profile: VERY LOW — the implant IS the network device; no separate malware process to detect

  • Defining campaigns: Salt Typhoon (telecom backbone, CALEA access); SPAWN (Ivanti firmware persistence surviving factory reset); BRICKSTORM (VMware vCenter/ESXi backdoor, 393-day average dwell time)

2025–2026: Pre-Positioning at Scale

  • Characteristic: Volt Typhoon-style pre-positioning in critical infrastructure — not for current intelligence but for future sabotage capability

  • Tooling: Living-off-the-land on network devices (no custom malware), dormant capabilities

  • Detection profile: Near-zero — no novel tools, no suspicious traffic, no network anomalies

  • Emerging: APT41 DodgeBox/MoonWalk with environmental keying (payload only decrypts on the target machine); AI-assisted reconnaissance


Part III — Full Kill Chain: Phase-by-Phase TTPs with Detection Logic

Phase 1 – Reconnaissance

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Recon

Active Scanning of Edge Devices

T1595.002

Salt Typhoon

>10 management interface paths probed in 60 sec + version fingerprinting + no prior legitimate history. Whitelist known scanners.

NGFW / WAF IDS / IPS SIEM

Recon

LinkedIn/Job Posting Research

T1591

APT41

Review technology details exposed in job postings and engineer profiles.

Digital Risk Protection (DRP) OSINT Platforms

Phase 2 – Initial Access

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Initial Access

Exchange SSRF + File Write

T1190

HAFNIUM

Sysmon 11: w3wp.exe creates .aspx. IIS Logs: X-BEResource header in unauthenticated request + status 200.

EDR Log Forwarder / SIEM

Initial Access

Forged Cloud Tokens

T1078.004

Storm-0558

M365 UAL: MailItemsAccessed with NO corresponding sign-in event for same UserId + ClientIP + AppId within ±30 min window.

Cloud SIEM ITDR / IAM Auditing

Initial Access

Edge Device Exploitation

T1190

Salt Typhoon / UNC5221

Cisco IOS-XE: New local user via web mgmt from external IP. Ivanti: ICT scan anomalies.

Network Syslog Vendor Integrity Checking Tools

Initial Access

Cloud Control Plane Pre-positioning

T1078.004

Volt Typhoon (Cloud Variant)

AWS: sts:AssumeRole without MFAUsed=true from non-corporate IPs. GCP: compute.project.setCommonInstanceMetadata modifying SSH keys.

CNAPP / CSPM Cloud Audit Logs / SIEM

Key CVEs Exploited (2021–2025):

  • CVE-2021-26855 / CVE-2021-27065 (ProxyLogon)

  • CVE-2023-20198 / CVE-2023-20273 (Cisco IOS-XE)

  • CVE-2023-46805 / CVE-2024-21887 (Ivanti Connect Secure)

  • CVE-2024-21762 (Fortinet SSL-VPN)

  • CVE-2025-0282 / CVE-2025-22457 (Ivanti Connect Secure)

Phase 3 – Execution & Persistence

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Persistence

Web Shell — ASPX Drop

T1505.003

HAFNIUM / APT41

Sysmon 11: w3wp.exe creates new .aspx in web root. Sysmon 1: w3wp.exe spawns cmd/powershell.

EDR File Integrity Monitoring (FIM)

Persistence

ESXi VIB Installation

T1547

BRICKSTORM

ESXi syslog: esxcli software vib install with CommunitySupported acceptance. Any VIB not in whitelist = CRITICAL.

Hypervisor Logging / SIEM

Persistence

SPAWN Firmware Implant

T1542.003

UNC5221

ICT scan mismatch + unexpected listeners on edge device + anomalous SSH auth.

NDR / NTA

Persistence

Linux Kernel / eBPF Abuse

T1547.006

Cross-Platform Ext.

Unprivileged bpf() syscalls, raw socket creation by web processes (nginx), or insmod/rmmod execution.

Linux EDR / CWPP eBPF Monitoring / Native Auditing

Persistence

macOS LaunchDaemon / XProtect Evasion

T1543.004

Cross-Platform Ext.

Unsigned binary modifications to /Library/LaunchDaemons. osascript establishing external C2.

macOS EDR / MDM Native OS Logging / Endpoint Visibility

Phase 4 – Privilege Escalation & Defense Evasion

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Defense Evasion

DLL Side-Loading

T1574.002

APT41 / BRICKSTORM

Sysmon 7: Legitimate signed app loads DLL from AppData/Downloads/Temp.

EDR (Behavioral Engine)

Defense Evasion

Log Clearing

T1070.001

All China operators

WinSec 1102: Audit log cleared. WinSec 4719: Audit policy changed.

SIEM

Execution

Environmental Keying

T1027.002

APT41 DodgeBox

Rapid sequence: GetVolumeInformationW + GetComputerNameW + CryptDecrypt from non-standard path.

Advanced Malware Sandbox EDR (API Hooking)

Phase 5 – Credential Access

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Cred Access

LSASS Dumping

T1003.001

HAFNIUM

Sysmon 10: TargetImage=lsass.exe, GrantedAccess 0x1fffff, SourceImage not in AV whitelist.

EDR Native OS Credential Protection

Cred Access

DCSync

T1003.006

APT41

WinSec 4662: DS-Replication-Get-Changes-All by non-DC account.

ITDR SIEM

Cred Access

Steal Application Token

T1528

Storm-0558

Token refresh without interactive sign-in + IP/UserAgent change between issuance and use.

IAM System Logs / Cloud SIEM

Phase 6 – Lateral Movement

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Lateral Movement

Pass-the-Hash (PtH) / Pass-the-Ticket

T1550.002

All China groups

WinSec 4624 (LogonType 3, NtLmSsp) with Key_Length=0, ABSENT a corresponding WinSec 4768 (TGT req). Alert on Tier 2 to Tier 0 access.

EDR / ITDR SIEM

Lateral Movement

WMI Remote Execution

T1021.006

HAFNIUM / APT41

Sysmon 1: WmiPrvSE.exe spawns cmd/powershell from non-management workstation.

EDR (Process Lineage Tracking)

Phase 7 – Collection & Exfiltration

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Collection

Email Export / API Mail Access

T1114.002

HAFNIUM / Storm-0558

Exchange: New-MailboxExportRequest. M365 UAL: MailItemsAccessed via EWS with custom AppId.

CASB / SaaS Security Posture Management

Exfiltration

SOCKS Proxy / Low & Slow Binary Tunneling

T1090.003

Salt Typhoon / SPAWN

Flow exceeding 60 minutes with <50 bytes/minute payload transfer on non-standard ports.

NDR / NTA Network Flow Monitoring

C2

ORB Network Relay

T1090.003

Multiple operators

Correlate long-duration binary/HTTPS flows to bare IPs mapped to residential ASNs.

NGFW Threat Intelligence Platforms (TIP) / SIEM

Detection Engineering Master Matrix

Phase

TTP

MITRE ID

Log Source

Key Event ID / Indicator

Actor

Initial Access

Exchange SSRF exploit

T1190

IIS Logs / WAF

X-BEResource header in unauthenticated request

HAFNIUM

Initial Access

Forged OAuth token

T1078.004

M365 UAL

MailItemsAccessed with no sign-in event

Storm-0558

Initial Access

Edge device exploitation

T1190

Device syslog

New user created via web mgmt from external IP

Salt Typhoon, UNC5221

Persistence

Web shell — ASPX drop

T1505.003

Sysmon 11

w3wp.exe creates .aspx in OWA/aspnet_client

HAFNIUM, APT41

Persistence

ESXi VIB install

T1547

ESXi syslog

esxcli software vib install (CommunitySupported)

WARP PANDA

Persistence

WMI event subscription

T1546.003

Sysmon 19/20/21

New WMI consumer (CommandLine or Script type)

APT41

Persistence

SPAWN firmware implant

T1542.003

ICT + NetFlow

Unexpected listener on edge device + anomalous SSH

UNC5221

Credential Access

LSASS dump via ProcDump

T1003.001

Sysmon 10

lsass.exe GrantedAccess 0x1fffff from non-AV

HAFNIUM

Credential Access

LSASS dump via comsvcs

T1003.001

Sysmon 1

cmd.exe with comsvcs.dll MiniDump

HAFNIUM

Credential Access

DCSync

T1003.006

WinSec 4662

DS-Replication-Get-Changes-All by non-DC account

APT41

Defense Evasion

DLL side-loading

T1574.002

Sysmon 7

Legitimate app loads DLL from user-writable path

APT41, BRICKSTORM

Defense Evasion

Log clearing

T1070.001

WinSec 1102

Audit log cleared on server

All

Execution

Environmental keying

T1027.002

CAPA behavioral

GetVolumeInformationW + GetComputerNameW + CryptDecrypt

APT41 (DodgeBox)

Lateral Movement

Pass-the-Hash

T1550.002

WinSec 4624

EventID 4624 with Logon_Type 9, Authentication_Package=Negotiate, Logon_Process=seclogo from workstation

All

Lateral Movement

WMI lateral movement

T1021.006

Sysmon 1

WmiPrvSE.exe spawns cmd/powershell

HAFNIUM, APT41

Collection

PST mail export

T1114.002

WinSec + Sysmon

New-MailboxExportRequest from non-admin process

HAFNIUM

Collection

API-based mail access

T1114.002

M365 UAL

MailItemsAccessed via EWS with custom app

Storm-0558

Exfiltration

SOCKS proxy tunnel

T1090.003

NetFlow

Long-duration binary-protocol session on high port

Salt Typhoon / SPAWN

C2

ORB network relay

T1090.003

Firewall

HTTPS to residential IP, long duration, no domain

All (2024+)


Part IV — Threat Hunt Hypotheses

Disclaimer: These hunts complement EDR/ITDR alerting. Mature platforms may detect portions or most of this activity, but correlation, tuning, and escalation logic determine whether intrusion is caught pre-impact or post-encryption

Hunt 1: Surviving Web Shells — Post-Patch Persistence

Hypothesis: Exchange servers patched against ProxyLogon may still contain web shells placed before the patch date.

Core Detection Logic:

  • Identify all .aspx files in Exchange web paths (aspnet_client, OWA\\auth, ecp) with creation timestamp before March 2, 2021

  • Filter for files <2KB with no deployment record (China Chopper shells typically <500 bytes)

  • Validate: any ASPX file containing eval(), Execute(), or Invoke() of a request parameter = confirmed web shell

Alert Threshold: Any result = HIGH. No legitimate reason for pre-patch ASPX files in web root without deployment record.

Hunt 2: Storm-0558 Style — Tokenless Mail Access

Hypothesis: Forged tokens used to access mail without triggering sign-in events.

Note: Mature ITDR platforms may alert on orphaned mail access events — validate coverage before building custom logic.

Core Detection Logic:

  • Pull all MailItemsAccessed from UAL (rolling 30-day window)

  • Correlate on UserId + ClientIPAddress + AppId

  • Flag: mail access with NO matching sign-in event within ±30 min

  • Secondary: non-Microsoft first-party AppId accessing >50 messages/hour

High Confidence: Zero tolerance — any mail access without correlated sign-in is anomalous. Maintain explicit allowlist for legitimate service accounts.

Hunt 3: DodgeBox Environmental Keying

Hypothesis: DodgeBox executes a specific API sequence (volume serial → hostname → username → decrypt) that is rare in legitimate software.

Core Detection Logic:

  • Processes from non-standard paths with no command-line arguments

  • All four APIs called within 5-second window: GetVolumeInformationW, GetComputerNameW, GetUserNameW, CryptDecrypt/BCryptDecrypt

  • High-entropy PE from user-writable path

Alert Threshold: Any match outside known-good baseline warrants investigation. Sandbox with target-specific values to confirm environmental keying.

Hunt 4: SPAWN / BRICKSTORM — Edge Device Anomalies

Hypothesis: Infected edge devices exhibit tunneling (SPAWNMOLE) and anomalous SSH patterns (SPAWNSNAIL).

SPAWNMOLE Signals:

  • Long-duration flows (>30 min) from edge device management interface to external IP on non-standard port

  • Extremely low byte rate relative to duration (<10KB over >60 min)

  • Binary protocol on port 443 without HTTP/TLS handshake metadata

SPAWNSNAIL Signals:

  • SSH auth from non-management VLAN IP

  • Auth with key not in authorized_keys baseline

  • SSH from unexpected geographic location

Alert Threshold: Any SPAWNSNAIL indicator = immediate escalation. SPAWNMOLE requires 2+ data points.

CRITICAL: SPAWN survives firmware upgrade. Do not attempt remediation via patch — engage vendor PSIRT and plan hardware replacement.

Hunt 5: DCSync from Non-Domain-Controller

Hypothesis: APT41 using domain admin credentials to replicate all AD credential material.

Core Detection Logic:

  • WinSec 4662: Object type = domainDNS with replication GUIDs (1131f6ad-... DS-Replication-Get-Changes-All)

  • Exclude: machine accounts ($ suffix) and known DC computer accounts

  • Alert: ANY user account or non-DC machine account triggering replication

Alert Threshold: Non-DC account triggering DS-Replication-Get-Changes-All = CRITICAL. Definitive DCSync indicator.

Hunt 6: ESXi Hypervisor — Unauthorized VIB or Rogue VM

Hypothesis: BRICKSTORM persists as unauthorized VIB on ESXi hosts with network listeners and modified startup scripts.

VIB Audit:

  • List all VIBs, filter for CommunitySupported acceptance level

  • Compare against known-good baseline from change management

Network Listener Audit:

  • List all TCP/UDP listeners — any port not associated with VMware services (443, 22, 902) indicates backdoor

  • Attention to high-numbered ports (>10000) and port 8090 (Junction implant)

VM Audit:

  • Monitor for unsanctioned VM creation/deletion, especially cloning of DCs or credential vaults

  • Review VPXD logs for clone events outside business hours

Alert Threshold: Any unauthorized VIB = CRITICAL. Any unregistered VM = immediate investigation.


Part V — Leadership Briefing: Strategic Threat Posture

The Strategic Reality

The PRC cyber threat to your organization is not primarily about attacks — it is about persistent access for intelligence collection, potentially spanning years. The defining characteristic of China's most sophisticated operations (Salt Typhoon, Storm-0558, BRICKSTORM) is that they were active for 12–36 months before detection. You are not trying to prevent a cyberattack; you are trying to detect a nation-state intelligence operation that may already be underway.

The key insight: you don't just monitor PRC threat actors — you monitor the attack surfaces they have shifted to. When PRC operations moved from Exchange servers to edge devices to hypervisors to telecom backbone, detection had to move with them.

Three Things Leadership Must Understand

1. The traditional security stack has limited visibility into China's current tradecraft.

China's 2024–2026 approach (firmware implants, token forgery, hypervisor persistence) is specifically designed to operate below the visibility of EDR products, which run inside the OS on workstations. If the compromise is in the network device firmware (SPAWN), the Cisco router (Salt Typhoon), or the hypervisor (BRICKSTORM), your endpoint security is not looking at that attack surface.

Investment priority: Network traffic analysis (NTA) for behavioral anomalies, and edge device integrity verification programs.

2. Cloud identity is the new perimeter — and it has been compromised at the provider level.

Storm-0558 didn't need to compromise your M365 environment — they compromised Microsoft's signing key infrastructure and used it against you. Your security controls are downstream of a trust relationship with a vendor whose infrastructure was successfully penetrated.

Investment priority: Continuous access review in M365, conditional access policies that require device compliance and location constraints, and monitoring of the M365 Unified Audit Log (which requires an E5 or equivalent license — this is not optional for high-risk organizations).

3. Remediation of SPAWN requires hardware replacement, not patching.

If a SPAWN-infected device is discovered in your environment, standard patch/upgrade remediation will not work. Operational planning must account for the possibility that remediation of an edge device compromise requires physical replacement — with associated procurement lead times and service disruption.

Investment priority: Hardware replacement budgets and operational continuity planning for edge infrastructure.

Risk Prioritization by Actor

Actor

Likelihood

Impact

Your Asset at Risk

HAFNIUM / Exchange exploitation

HIGH (if on-prem Exchange)

HIGH

Email communications, intellectual property

Storm-0558 (Antique Typhoon)

MEDIUM (targeted: Gov, Defense, Tech)

CRITICAL

Executive communications, sensitive mail

Salt Typhoon

LOW (targeted: Telecom) / HIGH (if telecom)

CRITICAL

Network traffic, CALEA systems

APT41 / VAULT PANDA

MEDIUM (broad targeting)

HIGH

IP, source code, financial data

Volt Typhoon

LOW (targeted: Critical Infra)

CRITICAL

OT/ICS access, pre-positioning for disruption

WARP PANDA / BRICKSTORM

MEDIUM (VMware environments)

CRITICAL

Full hypervisor-level access, credential extraction via VM snapshots

This document reflects threat intelligence through 2025. Given China's demonstrated operational tempo and adaptive tradecraft, detection signatures and hunt hypotheses should be reviewed quarterly against current CISA/NSA advisories and threat intelligence reporting.


References

2026 Annual Threat Intelligence Reports

Report

Publisher

Year

Global Threat Report 2026

CrowdStrike

February 2026

Global Incident Response Report 2026

Unit 42 (Palo Alto Networks)

February 2026

Cyber Security Report 2026

Check Point Research

February 2026

Government & Regulatory Advisories

Identifier

Title

Publisher

Year

AA25-239A

Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System (Salt Typhoon)

CISA / FBI / NSA + 12 Partner Nations

August 2025

AR25-338A

BRICKSTORM Backdoor — Malware Analysis Report (12 samples analyzed across VMware vSphere and Windows)

CISA / NSA / Canadian Cyber Centre

December 2025 (updated February 2026)

AA23-193A

Enhanced Monitoring to Detect APT Activity Targeting Outlook Online (Storm-0558 response guidance)

CISA / FBI

July 2023

AA21-062A

Mitigate Microsoft Exchange Server Vulnerabilities (ProxyLogon)

CISA

March 2021

CISA Telecom Guidance

Enhanced Visibility and Hardening Guidance for Communications Infrastructure (Salt Typhoon response)

CISA / NSA / FBI

December 2024

CSRB Report

Review of the Summer 2023 Microsoft Exchange Online Intrusion (Storm-0558 Congressional review)

DHS Cyber Safety Review Board

March 2024

Volt Typhoon Advisory

PRC State-Sponsored Actors Compromise and Maintain Persistent Access to US Critical Infrastructure (Volt Typhoon)

CISA / NSA / FBI / Five Eyes

February 2024

APT41 Indictment

Seven International Cyber Defendants, Including "APT41" Actors, Charged in Connection with Computer Intrusion Campaigns

US Department of Justice

September 2020

Campaign-Specific Vendor Reporting (2021–2026)

Campaign / Actor

Report Title

Publisher

Year

Campaign / Actor

Report Title

Publisher

Year

ProxyLogon / HAFNIUM

"HAFNIUM Targeting Exchange Servers with 0-Day Exploits"

Microsoft MSTIC

March 2021

ProxyLogon / HAFNIUM

"Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities"

Volexity

March 2021

ProxyLogon

"Microsoft Exchange Server Attack Timeline"

Unit 42 (Palo Alto Networks)

March 2021

Storm-0558

"Analysis of Storm-0558 Techniques for Unauthorized Email Access"

Microsoft Security Blog

July 2023

Storm-0558

"Results of Major Technical Investigations for Storm-0558 Key Acquisition"

Microsoft Security Response Center

September 2023

Storm-0558

"Compromised Microsoft Key: More Impactful Than We Thought"

Wiz Research

July 2023

Salt Typhoon

"Enhanced Visibility and Hardening Guidance for Communications Infrastructure"

CISA / NSA / FBI

December 2024

Salt Typhoon

"Salt Typhoon Across the Internet: What AIDE Honeypots Reveal About a Persistent State-Linked Campaign"

Global Cyber Alliance

December 2025

Salt Typhoon

Congressional Research Service Report: "Salt Typhoon Hacks of Telecommunications Companies and Federal Response Implications"

Library of Congress / CRS

2024

APT41 / DodgeBox

"DodgeBox: A Deep Dive into the Updated Arsenal of APT41 — Part 1"

Zscaler ThreatLabz

July 2024

APT41 / MoonWalk

"MoonWalk: A Deep Dive into the Updated Arsenal of APT41 — Part 2"

Zscaler ThreatLabz

July 2024

APT41

"APT41 Has Arisen From the DUST"

Mandiant / Google Cloud

July 2024

SPAWN / UNC5221

"Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation"

Mandiant / Google Cloud

January 2025

SPAWN / UNC5221

"Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Vulnerability (CVE-2025-22457)"

Google Threat Intelligence Group

April 2025

SPAWN / UNC5221

"Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies"

Mandiant / Google Cloud

2024–2025

BRICKSTORM

"Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors"

Google Threat Intelligence Group

September 2025

BRICKSTORM

"Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary"

CrowdStrike

December 2025

BRICKSTORM

"NVISO Analyzes BRICKSTORM Espionage Backdoor"

NVISO

April 2025

Volt Typhoon

"Volt Typhoon Targets US Critical Infrastructure with Living-off-the-Land Techniques"

Microsoft MSTIC

May 2023

MITRE ATT&CK Group Profiles

Deepak Mangipudi
Deepak Mangipudi

Staff Engineer - Detection and Response, Aviatrix

Deepak is a Staff Engineer, Detection & Response at Aviatrix, specializing in detection engineering and adversary behavior analysis. He collaborates with cross-functional teams to identify emerging threats, design high-signal detections, and strengthen response capabilities across complex cloud and hybrid infrastructures.

Read Full Bio
PODCAST

Altitude

Secure The Connections Between Your Clouds and Cloud Workloads

Leverage a security fabric to meet compliance and reduce cost, risk, and complexity.

Cta pattren Image