Executive Summary
Between 2021 and 2026, PRC-affiliated threat actors executed the most consequential cyber espionage campaign in recorded history — not through sophistication alone, but through operational patience, institutional coordination, and systematic exploitation of trusted infrastructure.
The defining shift: China moved away from noisy, tool-heavy intrusions (2016–2020 vintage) toward a model where the attack surface is the infrastructure itself — edge devices, cloud identity systems, hypervisors, and telecommunications backbone. By 2025, PRC actors weren't breaking into networks from outside; they were living inside the fabric of enterprise connectivity.
However, effective defense in 2026 requires understanding how PRC cyber tradecraft evolved from 2021 onward, not just reacting to current headlines.
The most important defensive insight:
The techniques used in 2026 were built incrementally through campaigns executed between 2021 and 2025.
This article analyzes that progression and translates it into concrete detection and defensive strategy guidance.
Detection & Strategy DisclaimerThe thresholds and detection logic in this document are illustrative, not prescriptive. Values such as replay windows, exfil size limits, burst timing, or file modification rates must be tuned to your environment. Network design, workforce geography, cloud setup, logging depth, and normal user behavior all affect what is "anomalous." There is no universal threshold — only environment-calibrated detection.
Strategic Context: Why It Matters to Defenders
China's cyber operations are not opportunistic — they are doctrine-driven and institutionally coordinated.
PRC cyber strategy follows a long-horizon intelligence model: pre-position access during peacetime, collect strategically, and maintain the option for disruption during crisis.
Understanding the doctrinal arc helps you anticipate what attack surfaces will be targeted next and where to invest detection before exploitation occurs.
Strategic Shift
PRC cyber operations transitioned from bulk exploitation (ProxyLogon-era mass collection) to infrastructure-as-implant — embedding capabilities inside edge devices, cloud identity systems, hypervisors, and telecom backbone equipment that defenders cannot inspect with traditional endpoint tools.
The trajectory is clear: the implant is becoming the infrastructure itself.
Operational Implication for SOC & Threat Hunters
Geopolitical flashpoints between Washington and Beijing are no longer abstract policy issues—they are direct, early-warning triggers for People's Republic of China (PRC) state-sponsored cyber operations.
Part I — Strategic Pattern (2021 → 2026)
PRC cyber operations from 2021–2026 show four consistent characteristics:
Operational patience — dwell times measured in years, not days
Infrastructure-level targeting — edge devices, cloud identity, hypervisors, telecom backbone
Minimal tooling footprint — living-off-the-land on network devices; no custom malware to detect
Institutional coordination — multiple units (MSS, PLA, contracted groups) with distinct mandates but shared access infrastructure
The tactical stack evolved dramatically, but the doctrine remained consistent:
Gain access below visibility of endpoint tools
Persist through patching and remediation
Collect intelligence at scale
Maintain disruption option for future crisis
What Changed in PRC Cyber Operations (2021–2026)
1. Mass Exploitation Gave Way to Surgical Infrastructure Compromise
ProxyLogon (2021) saw HAFNIUM exploit 400,000+ Exchange servers indiscriminately. By 2024–2025, Salt Typhoon was surgically embedded inside US telecom carriers for 12+ months before detection — accessing CALEA wiretap systems to read US law enforcement surveillance feeds.
Defensive takeaway: Volume-based detection that worked against ProxyLogon-era attacks will miss Salt Typhoon-style operations entirely. Detection must shift to behavioral anomalies on infrastructure devices.
2. Cloud Identity Became the Primary Attack Surface
Storm-0558 (2023) forged Azure AD tokens using a stolen Microsoft consumer signing key — accessing ~25 government organizations' email without triggering any authentication event. The compromise occurred at the provider level, not the customer level.
Defensive takeaway: Your cloud security controls are downstream of a trust relationship with the provider. Monitor for mail access without corresponding sign-in events. M365 E5 UAL logging is not optional for high-risk organizations.
3. Edge Device Implants Designed for Decade-Scale Persistence
SPAWN (2025) was not a traditional implant — it was an implant ecosystem built to survive firmware re-flash, factory reset, and legitimate security patches on Ivanti devices. SPAWNANT patches the upgrade mechanism itself to re-inject malware during legitimate updates.
Defensive takeaway: Standard IR playbooks (isolate → patch → restore) do not work against SPAWN. Hardware replacement is the only guaranteed remediation.
4. Hypervisor Targeting as Domain-Equivalent Access
BRICKSTORM (2022–2025) targeted VMware vCenter/ESXi — one compromised hypervisor provides access to every VM on that host, regardless of guest OS patching, EDR coverage, or network segmentation.
Defensive takeaway: ESXi hosts should be treated as Tier 0 assets (equivalent to domain controllers). VIB installations, SSH access, and VM clone events require active monitoring.
5. Pre-Positioning for Future Disruption
Volt Typhoon maintained access to US critical infrastructure (energy, water, transport) using exclusively living-off-the-land techniques — no custom malware, no suspicious traffic, no network anomalies. The strategic goal: maintain persistent access as a deterrence and wartime disruption capability.
Defensive takeaway: Volt Typhoon-style pre-positioning has near-zero detection profile with conventional tools. Network segmentation, identity hygiene, and edge device integrity verification are the primary controls.
Current Target Prioritization
PRC targeting operates on strategic intelligence priorities:
Priority Tier | Target Category | Rationale |
Tier 1 | US defense, aerospace, national security, advanced technology | Direct intelligence collection for military/tech parity |
Tier 1 | US/global telecommunications carriers | Backbone-level signals intelligence (Salt Typhoon model) |
Tier 2 | US critical infrastructure (energy, water, transport) | Pre-positioning for crisis-time disruption (Volt Typhoon) |
Tier 2 | Government cloud environments (M365, Azure AD) | Executive/diplomatic communications access |
Tier 2 | Managed service providers (MSPs) | Supply chain access to downstream targets |
Tier 3 | Taiwan-adjacent organizations, AUKUS partners | Regional intelligence priorities |
Tier 3 | Research institutions, think tanks, universities | Technology and policy intelligence |
Detection Posture Adjustment
The following priorities should be elevated for any organization in Tier 1 or Tier 2:
Edge device integrity verification — Ivanti, Fortinet, Cisco, Juniper appliances in your environment should be checked against vendor ICT tools and known-good baselines. Any unpatched device is an active target.
Hypervisor audit — Review all ESXi VIB installations, SSH access logs, VM clone events, and startup scripts. Unauthorized VIB with
CommunitySupportedacceptance = immediate investigation.M365 UAL monitoring — Mail access (
MailItemsAccessed) without corresponding sign-in events from the same IP/AppId is the definitive Storm-0558-style indicator. Requires E5 licensing.Telecom/ISP anomaly detection — For telecom sector: audit all Cisco IOS-XE management interface access, policy-based routing changes, and CALEA system access logs.
ORB network awareness — Outbound HTTPS connections to residential ISP IP ranges with long duration and no associated domain = potential Operational Relay Box (ORB) C2.
Threat Actor Landscape
CrowdStrike Name | Microsoft Name | Common Name | Primary Mission | Primary Targets |
HAFNIUM | — | HAFNIUM | Intellectual property theft | US Defense, Research, Think Tanks |
WARP PANDA | — | — | Defense/Aerospace espionage, hypervisor persistence | Defense contractors, NATO allies, VMware environments |
HOLLOW PANDA | — | — | Hypervisor persistence | Virtualized enterprise infrastructure |
VAULT PANDA | APT41 | APT41/BARIUM | Dual espionage + cybercrime | Healthcare, Gaming, Telecom, Gov |
OPERATOR PANDA | — | APT10/Stone Panda | MSP/supply chain | Managed service providers globally |
MURKY PANDA | — | Salt Typhoon/UNC5221 | Telecom/ISP infiltration | US/Global telecom carriers |
— | Storm-0558 (Antique Typhoon) | — | Cloud identity compromise | Government email (US/EU) |
— | — | Volt Typhoon | Pre-positioning (critical infra) | Energy, Water, Transport, Comms |
Key distinction: PRC operates units across MSS (Ministry of State Security), PLA (People's Liberation Army), and contracted private groups, with different mandates:
MSS units (APT41, APT10, Storm-0558): Intelligence collection, technology theft, both state-tasked and moonlighting financially-motivated operations
PLA/strategic units (Salt Typhoon, Volt Typhoon): Infrastructure access, pre-positioning, signals intelligence — patient, low-noise, long-duration
IRGC-equivalent contractors: Groups like UNC5221 that operate semi-independently, targeting edge devices with zero-day exploitation
Attribution note: Attribution between groups is fluid. APT41/VAULT PANDA operates with state sanction but conducts financially-motivated operations on the side — making them uniquely dangerous as they maintain operational tempo even without direct state tasking.
Part II — Campaign Evolution Analysis (2021–2026)
2021: Volume and Velocity (ProxyLogon Era)
Characteristic: Mass exploitation of internet-facing services with web shell implants
Tooling: China Chopper, custom ASPX web shells, open-source tools (Mimikatz, Cobalt Strike)
Detection profile: HIGH — web shells are detectable, tool signatures are known, network traffic is noisy
Defining campaign: ProxyLogon — HAFNIUM weaponized 0-days at nation-scale within 72 hours; 400,000+ Exchange servers exposed; at least 10 threat groups adopted exploit within days
2022–2023: Identity and Stealth (Storm-0558 Era)
Characteristic: Cloud identity exploitation, token forgery, API-based mail access
Tooling: Custom token generation, legitimate Microsoft Graph/EWS APIs
Detection profile: LOW — no malware, no web shells, uses legitimate Microsoft APIs with valid tokens
Defining campaign: Storm-0558 — forged Azure AD tokens using stolen MSA consumer signing key; accessed ~25 government organizations' email; no authentication events generated
2023–2025: Infrastructure as Implant (Salt Typhoon / SPAWN Era)
Characteristic: Compromise the network infrastructure itself; implants that outlast IR response
Tooling: Custom firmware implants (SPAWN ecosystem), network traffic interception, BRICKSTORM hypervisor backdoor
Detection profile: VERY LOW — the implant IS the network device; no separate malware process to detect
Defining campaigns: Salt Typhoon (telecom backbone, CALEA access); SPAWN (Ivanti firmware persistence surviving factory reset); BRICKSTORM (VMware vCenter/ESXi backdoor, 393-day average dwell time)
2025–2026: Pre-Positioning at Scale
Characteristic: Volt Typhoon-style pre-positioning in critical infrastructure — not for current intelligence but for future sabotage capability
Tooling: Living-off-the-land on network devices (no custom malware), dormant capabilities
Detection profile: Near-zero — no novel tools, no suspicious traffic, no network anomalies
Emerging: APT41 DodgeBox/MoonWalk with environmental keying (payload only decrypts on the target machine); AI-assisted reconnaissance
Part III — Full Kill Chain: Phase-by-Phase TTPs with Detection Logic
Phase 1 – Reconnaissance
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Recon | Active Scanning of Edge Devices | T1595.002 | Salt Typhoon | >10 management interface paths probed in 60 sec + version fingerprinting + no prior legitimate history. Whitelist known scanners. | NGFW / WAF IDS / IPS SIEM |
Recon | LinkedIn/Job Posting Research | T1591 | APT41 | Review technology details exposed in job postings and engineer profiles. | Digital Risk Protection (DRP) OSINT Platforms |
Phase 2 – Initial Access
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Initial Access | Exchange SSRF + File Write | T1190 | HAFNIUM | Sysmon 11: w3wp.exe creates .aspx. IIS Logs: X-BEResource header in unauthenticated request + status 200. | EDR Log Forwarder / SIEM |
Initial Access | Forged Cloud Tokens | T1078.004 | Storm-0558 | M365 UAL: MailItemsAccessed with NO corresponding sign-in event for same UserId + ClientIP + AppId within ±30 min window. | Cloud SIEM ITDR / IAM Auditing |
Initial Access | Edge Device Exploitation | T1190 | Salt Typhoon / UNC5221 | Cisco IOS-XE: New local user via web mgmt from external IP. Ivanti: ICT scan anomalies. | Network Syslog Vendor Integrity Checking Tools |
Initial Access | Cloud Control Plane Pre-positioning | T1078.004 | Volt Typhoon (Cloud Variant) | AWS: | CNAPP / CSPM Cloud Audit Logs / SIEM |
Key CVEs Exploited (2021–2025):
CVE-2021-26855 / CVE-2021-27065 (ProxyLogon)
CVE-2023-20198 / CVE-2023-20273 (Cisco IOS-XE)
CVE-2023-46805 / CVE-2024-21887 (Ivanti Connect Secure)
CVE-2024-21762 (Fortinet SSL-VPN)
CVE-2025-0282 / CVE-2025-22457 (Ivanti Connect Secure)
Phase 3 – Execution & Persistence
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Persistence | Web Shell — ASPX Drop | T1505.003 | HAFNIUM / APT41 | Sysmon 11: w3wp.exe creates new .aspx in web root. Sysmon 1: w3wp.exe spawns cmd/powershell. | EDR File Integrity Monitoring (FIM) |
Persistence | ESXi VIB Installation | T1547 | BRICKSTORM | ESXi syslog: esxcli software vib install with CommunitySupported acceptance. Any VIB not in whitelist = CRITICAL. | Hypervisor Logging / SIEM |
Persistence | SPAWN Firmware Implant | T1542.003 | UNC5221 | ICT scan mismatch + unexpected listeners on edge device + anomalous SSH auth. | NDR / NTA |
Persistence | Linux Kernel / eBPF Abuse | T1547.006 | Cross-Platform Ext. | Unprivileged | Linux EDR / CWPP eBPF Monitoring / Native Auditing |
Persistence | macOS LaunchDaemon / XProtect Evasion | T1543.004 | Cross-Platform Ext. | Unsigned binary modifications to | macOS EDR / MDM Native OS Logging / Endpoint Visibility |
Phase 4 – Privilege Escalation & Defense Evasion
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Defense Evasion | DLL Side-Loading | T1574.002 | APT41 / BRICKSTORM | Sysmon 7: Legitimate signed app loads DLL from AppData/Downloads/Temp. | EDR (Behavioral Engine) |
Defense Evasion | Log Clearing | T1070.001 | All China operators | WinSec 1102: Audit log cleared. WinSec 4719: Audit policy changed. | SIEM |
Execution | Environmental Keying | T1027.002 | APT41 DodgeBox | Rapid sequence: GetVolumeInformationW + GetComputerNameW + CryptDecrypt from non-standard path. | Advanced Malware Sandbox EDR (API Hooking) |
Phase 5 – Credential Access
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Cred Access | LSASS Dumping | T1003.001 | HAFNIUM | Sysmon 10: TargetImage=lsass.exe, GrantedAccess 0x1fffff, SourceImage not in AV whitelist. | EDR Native OS Credential Protection |
Cred Access | DCSync | T1003.006 | APT41 | WinSec 4662: DS-Replication-Get-Changes-All by non-DC account. | ITDR SIEM |
Cred Access | Steal Application Token | T1528 | Storm-0558 | Token refresh without interactive sign-in + IP/UserAgent change between issuance and use. | IAM System Logs / Cloud SIEM |
Phase 6 – Lateral Movement
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Lateral Movement | Pass-the-Hash (PtH) / Pass-the-Ticket | T1550.002 | All China groups | WinSec 4624 (LogonType 3, NtLmSsp) with Key_Length=0, ABSENT a corresponding WinSec 4768 (TGT req). Alert on Tier 2 to Tier 0 access. | EDR / ITDR SIEM |
Lateral Movement | WMI Remote Execution | T1021.006 | HAFNIUM / APT41 | Sysmon 1: WmiPrvSE.exe spawns cmd/powershell from non-management workstation. | EDR (Process Lineage Tracking) |
Phase 7 – Collection & Exfiltration
Phase | TTP | MITRE ID | Derived From | Detection Logic | Tooling |
Collection | Email Export / API Mail Access | T1114.002 | HAFNIUM / Storm-0558 | Exchange: New-MailboxExportRequest. M365 UAL: MailItemsAccessed via EWS with custom AppId. | CASB / SaaS Security Posture Management |
Exfiltration | SOCKS Proxy / Low & Slow Binary Tunneling | T1090.003 | Salt Typhoon / SPAWN | Flow exceeding 60 minutes with <50 bytes/minute payload transfer on non-standard ports. | NDR / NTA Network Flow Monitoring |
C2 | ORB Network Relay | T1090.003 | Multiple operators | Correlate long-duration binary/HTTPS flows to bare IPs mapped to residential ASNs. | NGFW Threat Intelligence Platforms (TIP) / SIEM |
Detection Engineering Master Matrix
Phase | TTP | MITRE ID | Log Source | Key Event ID / Indicator | Actor |
Initial Access | Exchange SSRF exploit | T1190 | IIS Logs / WAF | X-BEResource header in unauthenticated request | HAFNIUM |
Initial Access | Forged OAuth token | T1078.004 | M365 UAL | MailItemsAccessed with no sign-in event | Storm-0558 |
Initial Access | Edge device exploitation | T1190 | Device syslog | New user created via web mgmt from external IP | Salt Typhoon, UNC5221 |
Persistence | Web shell — ASPX drop | T1505.003 | Sysmon 11 | w3wp.exe creates .aspx in OWA/aspnet_client | HAFNIUM, APT41 |
Persistence | ESXi VIB install | T1547 | ESXi syslog | esxcli software vib install (CommunitySupported) | WARP PANDA |
Persistence | WMI event subscription | T1546.003 | Sysmon 19/20/21 | New WMI consumer (CommandLine or Script type) | APT41 |
Persistence | SPAWN firmware implant | T1542.003 | ICT + NetFlow | Unexpected listener on edge device + anomalous SSH | UNC5221 |
Credential Access | LSASS dump via ProcDump | T1003.001 | Sysmon 10 | lsass.exe GrantedAccess 0x1fffff from non-AV | HAFNIUM |
Credential Access | LSASS dump via comsvcs | T1003.001 | Sysmon 1 | cmd.exe with comsvcs.dll MiniDump | HAFNIUM |
Credential Access | DCSync | T1003.006 | WinSec 4662 | DS-Replication-Get-Changes-All by non-DC account | APT41 |
Defense Evasion | DLL side-loading | T1574.002 | Sysmon 7 | Legitimate app loads DLL from user-writable path | APT41, BRICKSTORM |
Defense Evasion | Log clearing | T1070.001 | WinSec 1102 | Audit log cleared on server | All |
Execution | Environmental keying | T1027.002 | CAPA behavioral | GetVolumeInformationW + GetComputerNameW + CryptDecrypt | APT41 (DodgeBox) |
Lateral Movement | Pass-the-Hash | T1550.002 | WinSec 4624 | EventID 4624 with Logon_Type 9, Authentication_Package=Negotiate, Logon_Process=seclogo from workstation | All |
Lateral Movement | WMI lateral movement | T1021.006 | Sysmon 1 | WmiPrvSE.exe spawns cmd/powershell | HAFNIUM, APT41 |
Collection | PST mail export | T1114.002 | WinSec + Sysmon | New-MailboxExportRequest from non-admin process | HAFNIUM |
Collection | API-based mail access | T1114.002 | M365 UAL | MailItemsAccessed via EWS with custom app | Storm-0558 |
Exfiltration | SOCKS proxy tunnel | T1090.003 | NetFlow | Long-duration binary-protocol session on high port | Salt Typhoon / SPAWN |
C2 | ORB network relay | T1090.003 | Firewall | HTTPS to residential IP, long duration, no domain | All (2024+) |
Part IV — Threat Hunt Hypotheses
Disclaimer: These hunts complement EDR/ITDR alerting. Mature platforms may detect portions or most of this activity, but correlation, tuning, and escalation logic determine whether intrusion is caught pre-impact or post-encryption
Hunt 1: Surviving Web Shells — Post-Patch Persistence
Hypothesis: Exchange servers patched against ProxyLogon may still contain web shells placed before the patch date.
Core Detection Logic:
Identify all
.aspxfiles in Exchange web paths (aspnet_client,OWA\\auth,ecp) with creation timestamp before March 2, 2021Filter for files <2KB with no deployment record (China Chopper shells typically <500 bytes)
Validate: any ASPX file containing
eval(),Execute(), orInvoke()of a request parameter = confirmed web shell
Alert Threshold: Any result = HIGH. No legitimate reason for pre-patch ASPX files in web root without deployment record.
Hunt 2: Storm-0558 Style — Tokenless Mail Access
Hypothesis: Forged tokens used to access mail without triggering sign-in events.
Note: Mature ITDR platforms may alert on orphaned mail access events — validate coverage before building custom logic.
Core Detection Logic:
Pull all
MailItemsAccessedfrom UAL (rolling 30-day window)Correlate on
UserId + ClientIPAddress + AppIdFlag: mail access with NO matching sign-in event within ±30 min
Secondary: non-Microsoft first-party AppId accessing >50 messages/hour
High Confidence: Zero tolerance — any mail access without correlated sign-in is anomalous. Maintain explicit allowlist for legitimate service accounts.
Hunt 3: DodgeBox Environmental Keying
Hypothesis: DodgeBox executes a specific API sequence (volume serial → hostname → username → decrypt) that is rare in legitimate software.
Core Detection Logic:
Processes from non-standard paths with no command-line arguments
All four APIs called within 5-second window:
GetVolumeInformationW,GetComputerNameW,GetUserNameW,CryptDecrypt/BCryptDecryptHigh-entropy PE from user-writable path
Alert Threshold: Any match outside known-good baseline warrants investigation. Sandbox with target-specific values to confirm environmental keying.
Hunt 4: SPAWN / BRICKSTORM — Edge Device Anomalies
Hypothesis: Infected edge devices exhibit tunneling (SPAWNMOLE) and anomalous SSH patterns (SPAWNSNAIL).
SPAWNMOLE Signals:
Long-duration flows (>30 min) from edge device management interface to external IP on non-standard port
Extremely low byte rate relative to duration (<10KB over >60 min)
Binary protocol on port 443 without HTTP/TLS handshake metadata
SPAWNSNAIL Signals:
SSH auth from non-management VLAN IP
Auth with key not in
authorized_keysbaselineSSH from unexpected geographic location
Alert Threshold: Any SPAWNSNAIL indicator = immediate escalation. SPAWNMOLE requires 2+ data points.
CRITICAL: SPAWN survives firmware upgrade. Do not attempt remediation via patch — engage vendor PSIRT and plan hardware replacement.
Hunt 5: DCSync from Non-Domain-Controller
Hypothesis: APT41 using domain admin credentials to replicate all AD credential material.
Core Detection Logic:
WinSec 4662: Object type = domainDNS with replication GUIDs (
1131f6ad-...DS-Replication-Get-Changes-All)Exclude: machine accounts (
$suffix) and known DC computer accountsAlert: ANY user account or non-DC machine account triggering replication
Alert Threshold: Non-DC account triggering DS-Replication-Get-Changes-All = CRITICAL. Definitive DCSync indicator.
Hunt 6: ESXi Hypervisor — Unauthorized VIB or Rogue VM
Hypothesis: BRICKSTORM persists as unauthorized VIB on ESXi hosts with network listeners and modified startup scripts.
VIB Audit:
List all VIBs, filter for
CommunitySupportedacceptance levelCompare against known-good baseline from change management
Network Listener Audit:
List all TCP/UDP listeners — any port not associated with VMware services (443, 22, 902) indicates backdoor
Attention to high-numbered ports (>10000) and port 8090 (Junction implant)
VM Audit:
Monitor for unsanctioned VM creation/deletion, especially cloning of DCs or credential vaults
Review VPXD logs for clone events outside business hours
Alert Threshold: Any unauthorized VIB = CRITICAL. Any unregistered VM = immediate investigation.
Part V — Leadership Briefing: Strategic Threat Posture
The Strategic Reality
The PRC cyber threat to your organization is not primarily about attacks — it is about persistent access for intelligence collection, potentially spanning years. The defining characteristic of China's most sophisticated operations (Salt Typhoon, Storm-0558, BRICKSTORM) is that they were active for 12–36 months before detection. You are not trying to prevent a cyberattack; you are trying to detect a nation-state intelligence operation that may already be underway.
The key insight: you don't just monitor PRC threat actors — you monitor the attack surfaces they have shifted to. When PRC operations moved from Exchange servers to edge devices to hypervisors to telecom backbone, detection had to move with them.
Three Things Leadership Must Understand
1. The traditional security stack has limited visibility into China's current tradecraft.
China's 2024–2026 approach (firmware implants, token forgery, hypervisor persistence) is specifically designed to operate below the visibility of EDR products, which run inside the OS on workstations. If the compromise is in the network device firmware (SPAWN), the Cisco router (Salt Typhoon), or the hypervisor (BRICKSTORM), your endpoint security is not looking at that attack surface.
Investment priority: Network traffic analysis (NTA) for behavioral anomalies, and edge device integrity verification programs.
2. Cloud identity is the new perimeter — and it has been compromised at the provider level.
Storm-0558 didn't need to compromise your M365 environment — they compromised Microsoft's signing key infrastructure and used it against you. Your security controls are downstream of a trust relationship with a vendor whose infrastructure was successfully penetrated.
Investment priority: Continuous access review in M365, conditional access policies that require device compliance and location constraints, and monitoring of the M365 Unified Audit Log (which requires an E5 or equivalent license — this is not optional for high-risk organizations).
3. Remediation of SPAWN requires hardware replacement, not patching.
If a SPAWN-infected device is discovered in your environment, standard patch/upgrade remediation will not work. Operational planning must account for the possibility that remediation of an edge device compromise requires physical replacement — with associated procurement lead times and service disruption.
Investment priority: Hardware replacement budgets and operational continuity planning for edge infrastructure.
Risk Prioritization by Actor
Actor | Likelihood | Impact | Your Asset at Risk |
HAFNIUM / Exchange exploitation | HIGH (if on-prem Exchange) | HIGH | Email communications, intellectual property |
Storm-0558 (Antique Typhoon) | MEDIUM (targeted: Gov, Defense, Tech) | CRITICAL | Executive communications, sensitive mail |
Salt Typhoon | LOW (targeted: Telecom) / HIGH (if telecom) | CRITICAL | Network traffic, CALEA systems |
APT41 / VAULT PANDA | MEDIUM (broad targeting) | HIGH | IP, source code, financial data |
Volt Typhoon | LOW (targeted: Critical Infra) | CRITICAL | OT/ICS access, pre-positioning for disruption |
WARP PANDA / BRICKSTORM | MEDIUM (VMware environments) | CRITICAL | Full hypervisor-level access, credential extraction via VM snapshots |
This document reflects threat intelligence through 2025. Given China's demonstrated operational tempo and adaptive tradecraft, detection signatures and hunt hypotheses should be reviewed quarterly against current CISA/NSA advisories and threat intelligence reporting.
References
2026 Annual Threat Intelligence Reports
Report | Publisher | Year |
CrowdStrike | February 2026 | |
Unit 42 (Palo Alto Networks) | February 2026 | |
Check Point Research | February 2026 |
Government & Regulatory Advisories
Identifier | Title | Publisher | Year |
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System (Salt Typhoon) | CISA / FBI / NSA + 12 Partner Nations | August 2025 | |
BRICKSTORM Backdoor — Malware Analysis Report (12 samples analyzed across VMware vSphere and Windows) | CISA / NSA / Canadian Cyber Centre | December 2025 (updated February 2026) | |
Enhanced Monitoring to Detect APT Activity Targeting Outlook Online (Storm-0558 response guidance) | CISA / FBI | July 2023 | |
Mitigate Microsoft Exchange Server Vulnerabilities (ProxyLogon) | CISA | March 2021 | |
Enhanced Visibility and Hardening Guidance for Communications Infrastructure (Salt Typhoon response) | CISA / NSA / FBI | December 2024 | |
Review of the Summer 2023 Microsoft Exchange Online Intrusion (Storm-0558 Congressional review) | DHS Cyber Safety Review Board | March 2024 | |
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to US Critical Infrastructure (Volt Typhoon) | CISA / NSA / FBI / Five Eyes | February 2024 | |
Seven International Cyber Defendants, Including "APT41" Actors, Charged in Connection with Computer Intrusion Campaigns | US Department of Justice | September 2020 |
Campaign-Specific Vendor Reporting (2021–2026)
Campaign / Actor | Report Title | Publisher | Year |
Campaign / Actor | Report Title | Publisher | Year |
ProxyLogon / HAFNIUM | Microsoft MSTIC | March 2021 | |
ProxyLogon / HAFNIUM | Volexity | March 2021 | |
ProxyLogon | Unit 42 (Palo Alto Networks) | March 2021 | |
Storm-0558 | "Analysis of Storm-0558 Techniques for Unauthorized Email Access" | Microsoft Security Blog | July 2023 |
Storm-0558 | "Results of Major Technical Investigations for Storm-0558 Key Acquisition" | Microsoft Security Response Center | September 2023 |
Storm-0558 | Wiz Research | July 2023 | |
Salt Typhoon | "Enhanced Visibility and Hardening Guidance for Communications Infrastructure" | CISA / NSA / FBI | December 2024 |
Salt Typhoon | Global Cyber Alliance | December 2025 | |
Salt Typhoon | Library of Congress / CRS | 2024 | |
APT41 / DodgeBox | "DodgeBox: A Deep Dive into the Updated Arsenal of APT41 — Part 1" | Zscaler ThreatLabz | July 2024 |
APT41 / MoonWalk | "MoonWalk: A Deep Dive into the Updated Arsenal of APT41 — Part 2" | Zscaler ThreatLabz | July 2024 |
APT41 | Mandiant / Google Cloud | July 2024 | |
SPAWN / UNC5221 | "Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation" | Mandiant / Google Cloud | January 2025 |
SPAWN / UNC5221 | Google Threat Intelligence Group | April 2025 | |
SPAWN / UNC5221 | "Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies" | Mandiant / Google Cloud | 2024–2025 |
BRICKSTORM | "Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors" | Google Threat Intelligence Group | September 2025 |
BRICKSTORM | "Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary" | CrowdStrike | December 2025 |
BRICKSTORM | NVISO | April 2025 | |
Volt Typhoon | "Volt Typhoon Targets US Critical Infrastructure with Living-off-the-Land Techniques" | Microsoft MSTIC | May 2023 |
MITRE ATT&CK Group Profiles
Group ID | Name | Profile Link |
G0125 | HAFNIUM | HAFNIUM, Operation Exchange Marauder, Silk Typhoon, Group G0125 | MITRE ATT&CK® |
G0096 | APT41 | APT41, Wicked Panda, Brass Typhoon, BARIUM, Group G0096 | MITRE ATT&CK® |
G0098 | APT10 / Stone Panda | |
G1017 | Volt Typhoon |












