Volt Typhoon OT Defense Stop Lateral Movement from IT to OT.
Volt Typhoon compromises IT, hides as legitimate administrative activity, and pivots to OT through whatever access path exists. CISA's April 2026 guidance names this attack pattern explicitly. The defense is identity-bound access at the IT/OT boundary, not network segmentation alone. This page covers what works.
Who Volt Typhoon Targets and Why.
Volt Typhoon is a state-sponsored threat group attributed to the People's Republic of China that has been active against US critical infrastructure since at least 2021. CISA, NSA, FBI, and allied intelligence agencies have issued multiple joint advisories naming the group. The group's distinguishing tradecraft is living-off-the-land: avoiding malware in favor of legitimate administrative tools that make detection by signature-based defenses nearly impossible. Targets include water and wastewater utilities, energy operators, transportation, and manufacturing. The objective is pre-positioning, not immediate disruption. Trout maintains a public threat intelligence portal at https://threat-intelligence.trout.software/ with per-actor profiles and indicators.
Visit the Trout Threat Intelligence PortalHow the IT-to-OT Pivot Works.
Every published Volt Typhoon investigation follows a similar shape. Initial compromise on the IT side. Credential harvesting from common stores. Use of built-in administrative tools (PowerShell, WMI, RDP) for movement. Identification of the IT/OT boundary. Pivot through the path of least resistance. The defense lives at that pivot point.
The April 2026 Position.
CISA's joint guidance published April 29, 2026 with the Department of War, DOE, FBI, and Department of State names Volt Typhoon as the canonical example of why network segmentation alone is insufficient. The recommendation is to assume the IT side is already compromised and design the OT boundary accordingly. Every IT-to-OT session must be authenticated, authorized, and logged. Inventory of paths is not a control. Identity-bound access is.
Read our full analysis of the CISA guidanceMapped to Volt Typhoon TTPs.
Each defense below addresses a specific stage of the documented Volt Typhoon attack chain. Network segmentation is necessary but not sufficient because Volt Typhoon moves through paths that are explicitly permitted by segmentation policy.
Phishing, exposed VPN/RDP, or unpatched edge device on the IT side.
MFA on every external-facing service. Access Gate enforces MFA at the proxy boundary for any session that will eventually reach OT, regardless of the entry point.
Mimikatz, LSASS dumps, or extraction from password managers and AD. Sometimes credentials are stored in plaintext in jump-host scripts.
No shared credentials reach the OT boundary. Identity is presented to Access Gate from your IdP (Entra ID, Okta, etc.) per-session. Static OT credentials never sit on a workstation that can be compromised.
PowerShell remoting, WMI, RDP, SMB. Movement looks like normal admin activity. Signature-based defenses miss it.
Detection on the IT side is necessary but not sufficient. The cut-off point is the IT/OT boundary, where Access Gate enforces explicit per-user policy regardless of where the connection originated.
Map of historian replication paths, vendor remote-access tunnels, dual-homed engineering workstations, file transfer servers.
Every IT/OT path terminates at Access Gate. There is no dual-homed shortcut, no forgotten vendor tunnel that bypasses enforcement. The path inventory is the policy inventory.
Use of legitimate OT credentials (often shared, often static) to reach SCADA, HMIs, or PLCs. Establishment of persistence.
OT-side authentication enforced at Access Gate. The connecting user's identity is bound to the session, not the asset's local credential. A flagged session is denied, not just logged.
Remain dormant. Avoid actions that would trigger anomaly detection. Wait for activation.
Full session recording with replay. Even a dormant adversary's reconnaissance creates an audit trail. Anomaly detection on session patterns surfaces low-and-slow activity that signature defenses miss.
Frequently Asked Questions
Who is Volt Typhoon?
Why does Volt Typhoon target OT specifically?
What does CISA recommend for Volt Typhoon defense in OT?
Is network segmentation enough to stop Volt Typhoon?
What specific Trout Access Gate capability addresses Volt Typhoon?
Where can I track Volt Typhoon and other named OT threat groups?
Stress-Test Your IT/OT Boundary.
Request a working session. We will walk through your IT/OT access paths, identify where shared credentials or unmanaged remote access leave a Volt Typhoon path open, and show how Access Gate closes it.
Request a Working Session