HIGH
HIGH
CRITICAL
The device sitting between your modem and your laptop has, for years, been treated as a utility β plug it in, forget it exists, change the Wi-Fi password when your neighbor’s kid asks for it. That comfortable invisibility is precisely what three Chinese state-sponsored hacking groups β Volt Typhoon, Flax Typhoon, and Salt Typhoon β systematically weaponized against the United States. What they accomplished using that overlooked box of blinking lights is now the subject of the most sweeping telecommunications security action in FCC history.
In March 2026, the FCC formally banned the sale of all new consumer-grade routers manufactured outside the United States, citing an “unacceptable national security risk.” The order, championed by FCC Chair Brendan Carr, targets not just TP-Link β which had been specifically under federal scrutiny for over a year β but virtually every major router brand on American shelves, since nearly all are manufactured, assembled, or designed at least in part outside the US. The scale of the action is without precedent. So is the threat that preceded it.
This is not a story about theoretical vulnerabilities or speculative risk assessments. The Cybersecurity and Infrastructure Security Agency (CISA), the NSA, the FBI, and allied intelligence agencies from Australia, the UK, Canada, and New Zealand have all confirmed what the hacking campaigns achieved: deep, long-duration access to US energy grids, water systems, telecommunications backbones, and the classified wiretap systems used by federal law enforcement. Senator Mark Warner, chair of the Senate Intelligence Committee, called Salt Typhoon alone “the worst telecom hack in our nation’s history.” This report examines how each campaign unfolded, what was compromised, and what the ban actually changes.
CISA Advisory AA24-038A (February 2024, joint with NSA and FBI): “Volt Typhoon has compromised the IT environments of multiple critical infrastructure organizations… The US authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions.”
FBI Joint Advisory AA24-249A (September 2024): “PRC state-sponsored cyber actors have compromised and maintained persistent access to US and allied critical infrastructure… using consumer routers infected with Mirai-based malware as anonymizing proxy infrastructure.”
CISA Advisory AA25-239A (September 2025): “These actors often modify routers to maintain persistent, long-term access to networks.”
Senate Intelligence Committee, Senator Mark Warner (December 2024): “This is the worst telecom hack in our nation’s history β and the full scope of the damage is still being assessed.”
Audit your router immediately. Log in to your router’s admin panel and confirm it is running the latest available firmware. If your router is end-of-life (the manufacturer no longer issues updates), replace it β an unpatched router is an open door. Check your router model against CISA’s Known Exploited Vulnerabilities catalog at cisa.gov/known-exploited-vulnerabilities-catalog.
Change default credentials β everywhere. Volt Typhoon and Flax Typhoon both exploited devices running factory-default usernames and passwords. Change the admin password on your router, all IP cameras, NAS devices, and smart home hubs. Use a unique, strong password for each device.
Disable remote management on your router. Unless you have a specific need, disable remote administration features (often labeled “Remote Management” or “WAN-side access”) in your router settings. Volt Typhoon frequently gained initial access via exposed remote management interfaces.
Segment your IoT devices onto a separate network. Most modern routers support a “guest network” or VLAN. Put all smart TVs, cameras, and IoT devices on an isolated network segment that cannot communicate with your computers and phones. This limits lateral movement if any one device is compromised.
Check whether your router or cameras appear on the FCC Covered List or CISA advisories. If you own Hikvision or Dahua security cameras, or a TP-Link router purchased before the FCC ban, these devices have documented security concerns and should be prioritized for replacement. Refer to fcc.gov/supplychain for the official Covered List.
For businesses: review your entire network equipment inventory. Any foreign-manufactured networking equipment β routers, switches, managed Wi-Fi access points β should be assessed against the latest CISA and NSA guidance. Prioritize replacement of end-of-life devices, enforce MFA on all network management accounts, and monitor for the LOTL techniques documented in CISA Advisory AA24-038A.
Frequently Asked Questions
Stay Informed on Security & Privacy
Sara Voss covers the security and privacy stories that matter before they become headlines. Subscribe for in-depth investigative reports on the threats shaping the digital landscape.
- CISA Advisory AA24-038A β “PRC State-Sponsored Actors Compromise and Maintain Persistent Access to US Critical Infrastructure,” CISA/NSA/FBI Joint Advisory, February 7, 2024. cisa.gov/news-events/cybersecurity-advisories/aa24-038a
- CISA Advisory AA25-239A β “Countering Chinese State-Sponsored Actors Compromise and Maintain Persistent Access to Routers and IoT Devices,” September 2025. cisa.gov/news-events/cybersecurity-advisories/aa25-239a
- FBI Joint Advisory AA24-249A β “People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations,” September 18, 2024. fbi.gov/news/stories/fbi-director-announces-chinese-botnet-disruption
- US Department of Justice Press Release β “Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers,” September 18, 2024. justice.gov/archives/opa/pr/court-authorized-operation-disrupts-worldwide-botnet
- FCC Equipment Authorization Order DA-26-278 β Consumer Router National Security Determination, March 23, 2026. docs.fcc.gov/public/attachments/DA-26-278A1.pdf
- CNET β “FCC Bans Foreign-Made Routers as a National Security Risk,” March 2026. cnet.com/home/internet/fcc-bans-foreign-made-routers-as-national-security-risk
- Wikipedia / Reuters β “2024 Global Telecommunications Hack (Salt Typhoon),” continuously updated. en.wikipedia.org/wiki/2024_global_telecommunications_hack
- The Wall Street Journal β “U.S. Wiretap Systems Targeted in China-Linked Hack,” October 5, 2024.
- Senator Mark Warner, Senate Intelligence Committee Statement, December 2024.
- US Treasury OFAC β Sanctions on Integrity Technology Group (Flax Typhoon front company), January 2025.
The editorial desk’s take on why the router ban is part of a broader geopolitical technology shift.
Maya Chen on the AI capabilities that matter most β and the infrastructure gaps that leave systems exposed.
Alex Rivera on the startups building AI systems with security architecture at their foundation.
