The U.S. energy grid is under sustained, multi-nation-state cyber siege. Chinese state-sponsored actor Volt Typhoon (tracked as Voltzite by Dragos) is not merely accessing utility networks — it is inside the control loops that manage industrial processes. Dragos CEO Robert Lee confirmed in February 2026 that Voltzite was “inside the control loop” of utility systems, positioning for future disruption rather than immediate attack. The Dragos case study of Littleton Electric Light and Water Departments revealed Volt Typhoon maintained access for over 300 days, exfiltrating OT operating procedures and spatial layout data of energy grid operations — information specifically useful for planning physical disruption. The Air Force has publicly warned that this access could enable China to wage “total war” by targeting base utilities.
Iranian-linked actors had already established footholds inside U.S. energy company networks weeks before the February 28 Operation Epic Fury strikes began. Iranian-aligned groups have claimed compromises of industrial control systems in allied nations. CISA’s Cyber Vulnerability Insights Estimate identifies 136 CVEs that Iranian actors have targeted or exploited — many affecting systems deployed in energy environments. Pro-Russian hacktivist groups have aligned with Iranian actors, creating coordinated multi-nation-state campaigns targeting energy infrastructure simultaneously.
The vulnerability landscape is expanding rapidly. ICS vulnerability disclosures nearly doubled from 2024 to 2025 — 2,451 vulnerabilities across 152 vendors. Siemens alone accounted for 1,175 of those. Hacktivists are increasingly targeting exposed HMI and SCADA systems at scale. A survey of over 100 energy facilities revealed widespread OT cybersecurity gaps including unpatched devices, insecure external connections, and weak network segmentation.
The bottom line: adversaries are already inside. The question is not whether your utility has been targeted — it is whether you have the visibility to know if they are already there. Immediate priority actions are listed under each threat item below.