Menu
Sign In Pricing Add Podcast
Podcast Image

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 7: Everything Everywhere All At Once

Mon, 28 Apr 2025

Description

The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous.  In Episode 7, host and former New York Times cybersecurity reporter, Nicole Perlroth, revisits a hack, more than a decade ago, where the motive was not entirely clear at the time. In hindsight, it was the opening salvo.

Audio
Transcription

Chapter 1: What is the everything everywhere all at once scenario?

3.414 - 9.32 Nicole Perlroth

This is truly an everything, everywhere, all at once scenario.

0

9.7 - 23.173 Nick Lawler

We see it in the transportation sector, we see it in the water sector, we see it in the communication sector, we see it in the energy sector. And the worst day is an everything, everywhere, all at once scenario.

0

23.646 - 35.174 Unnamed Expert

There's no reason for them to be in our water. There's no reason for them to be in our power. This is a decision by an actor to actually focus on civilian targets. That's not what we do.

0

35.615 - 43.0 Unnamed Expert

Russia is much like a hurricane. They're aggressive and come at us hard and fast. But China is climate change.

0

45.962 - 75.191 Nicole Perlroth

I'm Nicole Perleroth, and this is To Catch a Thief. Imagine you're the general manager for a local utility. Your company handles power and drinking water for a population of about 15,000. It has for more than a century. Even at this relatively small scale, there are still miles of pipes and untold numbers of valves to maintain and keep an eye on.

75.832 - 104.192 Nicole Perlroth

Like utilities across the country, you've enlisted the help of technology, software, to keep the power on and the water flowing smoothly. And save for hurricanes and the occasional downed power line, it has. And then, one Friday afternoon, you get a call. It's the FBI. They tell you, you've been compromised. This is not a hypothetical. Meet Nick Lawler.

104.212 - 111.418 Nick Lawler

Yep. Nick Lawler, general manager of the Littleton Electric Light and Water Departments in Littleton, Massachusetts.

Chapter 2: How did the FBI contact the Littleton utility?

112.009 - 123.438 Nicole Perlroth

Littleton is about the last place you'd expect would be a target for advanced nation-state hackers. It's a small farming community about a 45-minute drive west of Boston.

0

123.458 - 144.453 Nick Lawler

Yeah, it was the Friday before Thanksgiving. I remember it being a beautiful day. It's funny how you can remember certain things from a certain day when something bad happens, right? I was out doing yard work, and the call actually came through to our assistant general manager at the time, and he sent the call to me. It was a call directly from FBI officers in Boston, Massachusetts.

0

144.913 - 149.498 Unnamed Expert

Did you think that this was an actual FBI agent, or did you think this was a spam call?

0

149.952 - 171.136 Nick Lawler

No, he wanted me to give him my personal email address. And he wanted to send me an email with the link to click to kind of figure out what was going on on our networks in Littleton. It reminded me a lot of the Microsoft spam calls that you get that you... your operating system's out of date and, you know, please send us an email and we'll get it up to date for you. That's what it seemed like.

0

171.756 - 179.9 Nick Lawler

So I obviously didn't trust him. And he kept on saying he needed to get it on a personal email so that way the threat actors couldn't detect his presence.

181.178 - 188.527 Nicole Perlroth

Yeah, right. He was going to hand over his personal email and click on a link from some dude claiming to be from the FBI.

189.027 - 205.823 Nick Lawler

I really did not believe that it was real. Didn't believe him. I asked him to repeat his name. I then hung up the phone on him and then looked up our local FBI Boston office. Telephone number. I called that directly, asked for that gentleman, and he was there.

205.844 - 225.674 Nick Lawler

And he answered the phone and carried on the conversation like I didn't hang up the phone on him, which I still didn't give him my email address and still didn't think it was real, still thought it was some sort of scam. We said, no, if this is a real event and it's as serious as you say it is, then we'll see you in person on Monday morning. He was there at 10 o'clock sharp.

226.414 - 246.286 Nick Lawler

Then I got the call from the office, and two gentlemen are here to see you, one from Homeland Security and one from the FBI. And I'm like, oh, my God. Okay, this is real. Okay. From the X-Files? Yeah, the X-Files. The whole thing was like the movies. And even at that point, you still don't believe it. That's when they started talking about threat actors and really who they were.

Chapter 3: What is Volt Typhoon and why is it a threat?

367.561 - 384.372 Nick Lawler

It came out saying, how can we be the top priority of the federal government? And we have pretty good contacts with the Department of Energy through our trade association, American Public Power Association. So I called down to our contacts and just said, you know, and there's a lot they can't tell me because I don't have security clearances. And I just said, hey, this just happened.

0

385.112 - 397.178 Nick Lawler

Can you just tell me if Littleton is the top priority of the federal government? And they laughed at me a little bit. And then they said, well, what's going on? And I mentioned Vol Typhoon. And then it was just silence. Like, OK, oh, my God.

0

399.994 - 427.156 Nicole Perlroth

By the time the two men from FBI and CISA, the cyber defense agency, arrived at Nick's office that Monday in 2023, Volt Typhoon had been in Littleton's networks for 10 months. But beyond Littleton, they'd been burrowing into American infrastructure, ports, airports, railways, water, pipelines, the power grid, for years.

0

428.226 - 433.569 Unnamed Expert

When you called up these other utilities and said, hey, this is what we've lived through.

0

433.589 - 438.312 Nicole Perlroth

This is real. What was the response or range of responses?

439.353 - 455.323 Nick Lawler

Yeah, there's a range. There's still some utilities that think they're too small and never happened to them. There's some utilities that think they're very good and it won't happen to them. But we need to be prepared and we need to have processes in place to be able to handle it and mitigate it as quickly as we can.

455.97 - 460.431 Nicole Perlroth

For Nick, the implications of this kind of infiltration are clear.

460.891 - 475.435 Nick Lawler

Chaos. I mean, Americans can't live without power for 24 hours before they start losing their mind. And we're very much involved in mutual aid. So we see firsthand after a hurricane hits how quickly you need to get the electricity restored to businesses and residents.

476.115 - 491.301 Nick Lawler

From what we can tell, Voltaifun was gaining access to multiple networks to be able to create havoc in the United States at a point in time. And we can all guess what that point in time could be, and we'd probably all be wrong, but there was, you know, there's some thoughts related to Taiwan.

Chapter 4: How did the Littleton utility respond to the FBI's warning?

537.336 - 543.438 Unnamed Expert

Telvent, a Madrid-based company, they make IT systems that monitor everything from electric utilities to traffic flow.

0

543.758 - 547.559 Unnamed Expert

Telvent makes information technology systems, so-called smart grids.

0

548.539 - 567.808 Nicole Perlroth

Telvent's, quote, industrial automation software gives companies the ability to keep tabs on their oil and water pipelines and power lines from afar. Using Telvent software, engineers can detect a pipeline leak 100 miles offshore or a faulty circuit breaker in the grid.

0

568.309 - 583.017 Nicole Perlroth

A water utility worker could use Telvent software to detect a burst pipe or potentially any unhealthy fluctuations in chemicals, like fluoride. If you've ever heard techies talk about software eating the world, this is what they mean.

0

583.737 - 610.822 Nicole Perlroth

We have been baking software into everything from our gas and water systems to your Domino's pizza order, with nary a care for how all this digital convenience and connectivity might one day be used against us. I'd never heard of Telvent until I got a call from a guy named Dale Peterson. Dale spent his early career doing cryptography at NSA.

611.683 - 636.682 Nicole Perlroth

These days, he's one of the world's leading consultants in industrial control security, an especially terrifying subset of the cybersecurity industry that examines the myriad ways hackers can break into our pipelines, water systems, chemical plants, and, well, you get the picture. If there's an incident brewing at a utility or a pipeline, chances are Dale knows about it.

637.307 - 662.641 Dale Peterson

I think as soon as I heard about it, just because we hadn't seen them go after a target like this on a stealthy manner. And as you know, you don't get a lot of details from these companies when they're hacked. But the details they did provide indicated that there was more than just a casual intrusion, that they had been there in there a while and they were getting deep into their system.

663.188 - 676.176 Nicole Perlroth

Dale has a cryptographer's calm, careful way about him. He's not easily spooked. But when he rang me in late 2012, he sounded noticeably shaken.

677.336 - 695.896 Dale Peterson

The thing that really got my attention was these remote connections to these other sites that I've been on the other end with customers. I know that from that location, they used to connect in. to support projects that were being deployed. So it was something that put a lot of large, important companies at risk.

Chapter 5: What implications does the Volt Typhoon infiltration have?

758.726 - 771.219 Unnamed Expert

The story of what we know about the Stuxnet virus begins in June of 2010. Stuxnet was launched several years ago against an Iranian nuclear facility, almost certainly with some U.S. involvement.

0

771.399 - 780.649 Unnamed Expert

It was discovered just a couple weeks ago, but has been worming its way undetected through hundreds of computers in Iran and elsewhere in the Middle East for at least two years.

0

782.315 - 813.555 Nicole Perlroth

To this day, Stuxnet remains the most sophisticated cyber attack on record. For the uninitiated, Stuxnet was a joint U.S.-Israeli effort to sabotage Iran's nuclear program with code. and it worked spectacularly for a time. It was a computer worm that someone, we still don't know who exactly, injected into the computers at Ron's Natanz nuclear plant with a thumb drive.

0

814.576 - 840.91 Nicole Perlroth

And what that thumb drive unleashed was a string of zero days that enabled the worm to jump the air gap from engineers' computers on the IT side into the actual operations network, where the worm buried itself inside Natan's nuclear enrichment operations, and specifically the computers that control Iran's uranium centrifuges.

0

843.44 - 868.568 Nicole Perlroth

Those centrifuges, they form the beating heart of Iran's nuclear aspirations. Because to get weapons-grade uranium, you need to enrich uranium to a very high concentration of the isotope. And that, that requires spinning thousands of centrifuges at unthinkable speeds. We're talking more than 100,000 revolutions a minute.

869.089 - 897.075 Nicole Perlroth

But the rotors that spin these centrifuges, they're incredibly fragile and can be quite fickle. They break all the time, and they're controlled by these specialized computers that monitor and dictate their speed. And in 2009, those very computers were now controlled by code, working at the command of two of the world's most advanced intelligence agencies.

899.139 - 931.482 Nicole Perlroth

Stuxnet got to work spinning centrifuge rotors up. Then it would sit back for a few weeks and do nothing. Then it would slow the rotors way down. Sleep, speed up. Sleep, slow down. Sleep, repeat. And all the while, there was this Ocean's Eleven quality to the whole operation. If any of Natan's engineers happened to be watching their computer screens, everything appeared to be spinning just fine.

Chapter 6: What lessons were learned from past cyber attacks?

932.522 - 961.241 Nicole Perlroth

When right under their noses, Stuxnet was actively destroying a fifth of Iran's uranium supply and pushing Tehran's nuclear ambitions back years, all carefully choreographed to look like a natural accident. Inside Natan's, technicians couldn't make sense of it. The centrifuges were breaking down, but careful inspection turned up nothing unusual.

0

962.101 - 987.525 Nicole Perlroth

Suspecting subterfuge, Natan's officials started turning on each other. Several of the technicians were fired, and those remaining were told to physically guard the centrifuges with their lives. And all the while, their computers told them everything was just fine. The first inkling nuclear inspectors had that something was off here came in January 2010.

0

988.426 - 1021.388 Nicole Perlroth

Security camera footage outside Natan's centrifuge rooms showed frantic technicians in white lab coats and blue plastic shoe coverings carting out centrifuge after centrifuge. By public accounts, 2,000 of their 8,700 centrifuges were taken out. It was, in many ways, the digital Manhattan Project. Only in reverse. Because this, this was a counter-nuclear proliferation effort.

0

1022.229 - 1047.537 Nicole Perlroth

And it was a masterpiece. Until the day it got out. How it got out, we still don't know exactly. But sometime in 2010, Stuxnet fled the coop, escaped Natanz, zoomed around the world, and infected hundreds of thousands of machines, including right here in the U.S. at companies like Chevron.

0

1048.317 - 1059.926 Unnamed Expert

Chevron says its systems were at one point infected with Stuxnet. Nobody admits to it, but it's widely assumed the United States or Israel's defense forces created that virus. Now there's flame.

1060.825 - 1065.147 Unnamed Expert

Another virus apparently targeted at Iran, it dwarfs Stuxnet.

1065.387 - 1068.528 Unnamed Expert

Flame is 20 times the size of Stuxnet.

1068.648 - 1082.114 Unnamed Expert

It spread all over the world. Most of the infections that we saw were in Iran, but ultimately it escaped Iran and began to spread anywhere and everywhere. If you had a Windows machine connected to the internet, you could get infected by Stuxnet. And it's still out there today, spreading.

1084.215 - 1101.528 Nicole Perlroth

Now, it didn't do these systems any harm. Our saving grace was that Stuxnet's code was clearly designed with lawyers standing over developers' shoulders. The worm had been carefully calibrated to exact destruction only on the centrifuges at Natanz, and nowhere else.

Chapter 7: How can utilities prepare for cyber threats?

1201.283 - 1228.21 Nicole Perlroth

As Ralph spoke those words, Iran was already preparing its retribution. One year later, Tehran's hackers came for Saudi Aramco, a key source of US oil. And though they tried, they never did make the jump from Aramco's IT network into its pipelines. Tehran's hackers were still light years behind those of the US and Israel, but they still managed to decimate 30,000 Aramco computers on their way out.

0

1229.23 - 1240.511 Nicole Perlroth

And just in case their motive wasn't clear here, they made a point to replace all that data with one unmistakable image, a burning American flag.

0

1246.129 - 1259.818 Unnamed Expert

The attack, using a virus called Shamoon, did not disrupt oil production, calling it, quote, probably the most destructive cyber assault the private sector has ever seen. Another volley in an increasingly high-stakes war going on in cyberspace.

0

1260.359 - 1275.829 Nicole Perlroth

But the Aramco attack still felt a world away when, one month later, Chinese hackers hit Telvent. This wasn't Tehran. This was Beijing. And initially, at least, there was no reason to think its hackers were doing anything beyond the usual IP theft.

0

1276.849 - 1289.734 Nicole Perlroth

Automation had been listed high up on the CCP's latest five-year plan, and that would have put Telvent's industrial automation software firmly in CCP crosshairs. But Dale suspected there was more to the story.

1290.714 - 1310.235 Dale Peterson

The hack got into their network in such a way that it could do a couple things. One, it could change some of the source code, deliver bad code. with a backdoor or something of that nature. And they also had, until then it's not unique, they had connections to a lot of their customers.

1310.836 - 1323.399 Dale Peterson

So potentially, it was the first example of an attack that could be highly leveraged, where you say, if I can compromise this one system, I then can compromise all these other systems.

1324.339 - 1353.12 Nicole Perlroth

That last bit bears repeating. If I can compromise this one system, I can compromise all these others. Telvent wasn't the end goal. It was the gateway. If someone wanted to map out America's pipeline network, shut us down, or, God forbid, trigger simultaneous explosions across America, Telvent was precisely the company to hack.

1356.38 - 1375.684 Nicole Perlroth

When I wrote out my television investigation for The Times in early 2013, I laid this all out. But I left the motive as a question mark. Was this more Chinese industrial espionage? Or was this the first sign of the unimaginable? Twitter didn't like that very much. Many accused me of fear-mongering.

Chapter 8: What warning did experts give about future cyber attacks?

1451.688 - 1472.529 Leon Panetta

The collective result of these kinds of attacks could be a cyber Pearl Harbor, an attack that would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a new profound sense of vulnerability.

0

1474.534 - 1494.124 Nicole Perlroth

Panetta's cyber Pearl Harbor speech was also derided as hyperbolic at the time. But in retrospect, that stark vision he described of hackers seizing our critical switches, contaminating our water supply, it was clairvoyant. It would take another nine years for U.S.

0

1494.184 - 1513.64 Nicole Perlroth

intelligence officials to declassify their findings that, yes, the Telvin attack, along with a dozen other Chinese incursions into America's pipelines over that same window, attacks that never even crossed my radar, were the beginnings of a strategic Chinese pivot.

0

1513.96 - 1530.396 Unnamed Expert

The administration revealed that China had been involved in hacking of U.S. pipelines from 2011 to 2013. Chinese-backed hackers targeted and in many cases breached nearly two dozen companies that own such pipelines. The FBI and DHS unveiled...

0

1531.829 - 1543.756 Nicole Perlroth

Over the next decade, Chinese hackers started coming for American targets with little to no intelligence value at all. But their value for sabotage? Enormous.

1544.656 - 1553.141 Unnamed Expert

And now, with a program called Vault Typhoon, is putting cyber time bombs on our critical infrastructure, like our water, our grid, and our ports.

1553.482 - 1565.45 Unnamed Expert

It's been pouring into the networks of aviation, rail, mass transit, highway, maritime, The program injected malware into U.S. sectors like energy communications and water treatment.

1565.911 - 1584.587 Unnamed Expert

And the bulletin reads, Volt Typhoon has compromised the IT environments of multiple critical infrastructure organizations, primarily in communications, energy, transportation systems, critical infrastructure. Things like the cellular phone carriers are the target.

1586.112 - 1613.324 Nicole Perlroth

It wasn't just oil and gas pipelines. Over the next decade, they started breaking into major logistics hubs like Houston Seaport, the critical artery for American oil, gas, and petrochemicals. They broke into U.S. airports and railway systems. They broke into the Texas power grid. And we don't even have to imagine what a shutdown of that looks like.

Comments

There are no comments yet.

Please log in to write the first comment.