Β© 2020, Norebro Theme by Colabrio
Please assign a menu to the primary menu location

πŸ”’ Security & Privacy

The FCC’s Router Ban Is Bigger Than You Think: Inside the Volt, Flax, and Salt Typhoon Attacks

How three state-sponsored Chinese hacking campaigns turned the humble home router into America’s most dangerous attack surface β€” and why the FCC finally acted.

Sara Voss
Sara Voss, Investigative Tech Reporter
β€’March 24, 2026
πŸ” Investigative Report

🚨

πŸ‡ΊπŸ‡Έ National Security Impact
Three state-sponsored hacking campaigns β€” Volt, Flax, and Salt Typhoon β€” exploited consumer Wi-Fi routers to infiltrate US critical infrastructure, telecom networks, and federal wiretap systems. This is what happened β€” and what comes next.

⚠ Campaign Threat Assessment
Volt Typhoon β€” Infrastructure Prepositioning
HIGH
Flax Typhoon β€” Consumer Router Botnet
HIGH
Salt Typhoon β€” Telecom & Wiretap Infiltration
CRITICAL

The device sitting between your modem and your laptop has, for years, been treated as a utility β€” plug it in, forget it exists, change the Wi-Fi password when your neighbor’s kid asks for it. That comfortable invisibility is precisely what three Chinese state-sponsored hacking groups β€” Volt Typhoon, Flax Typhoon, and Salt Typhoon β€” systematically weaponized against the United States. What they accomplished using that overlooked box of blinking lights is now the subject of the most sweeping telecommunications security action in FCC history.

In March 2026, the FCC formally banned the sale of all new consumer-grade routers manufactured outside the United States, citing an “unacceptable national security risk.” The order, championed by FCC Chair Brendan Carr, targets not just TP-Link β€” which had been specifically under federal scrutiny for over a year β€” but virtually every major router brand on American shelves, since nearly all are manufactured, assembled, or designed at least in part outside the US. The scale of the action is without precedent. So is the threat that preceded it.

This is not a story about theoretical vulnerabilities or speculative risk assessments. The Cybersecurity and Infrastructure Security Agency (CISA), the NSA, the FBI, and allied intelligence agencies from Australia, the UK, Canada, and New Zealand have all confirmed what the hacking campaigns achieved: deep, long-duration access to US energy grids, water systems, telecommunications backbones, and the classified wiretap systems used by federal law enforcement. Senator Mark Warner, chair of the Senate Intelligence Committee, called Salt Typhoon alone “the worst telecom hack in our nation’s history.” This report examines how each campaign unfolded, what was compromised, and what the ban actually changes.

01
Inside the Three Campaigns: How State-Sponsored Hackers Used Your Router

Network server hardware

Volt Typhoon: Pre-Positioning Inside the Grid

Volt Typhoon is the most strategically alarming of the three campaigns. Unlike espionage-focused intrusions that seek to steal data and leave, Volt Typhoon’s documented objective β€” confirmed by CISA and the NSA in a February 2024 advisory β€” is prepositioning: burrowing deep into US critical infrastructure so that in the event of a military conflict or geopolitical crisis, Chinese operatives could trigger disruptive or destructive effects on command. Their targets span the communications, energy, transportation, and water and wastewater sectors, with a notable concentration around Guam, a critical US military staging point in the Pacific.

Their defining signature is “Living Off the Land” (LOTL) β€” the use of native operating system tools, legitimate credentials, and standard network utilities rather than custom malware. This approach is brutally effective at evading detection because the attack traffic is nearly indistinguishable from normal administrative activity. In documented cases, Volt Typhoon maintained persistent, undetected access to victim networks for up to five years. Routers β€” particularly end-of-life Cisco and Netgear devices β€” served as the critical relay points, masking the origin of attacker traffic by routing commands through compromised home and small-business equipment across the US.

Flax Typhoon: The 260,000-Device Botnet

Where Volt Typhoon is surgical, Flax Typhoon is industrial. Operating through a front company called Integrity Technology Group β€” which was subsequently sanctioned by the US Treasury β€” Flax Typhoon constructed a massive botnet of compromised consumer devices. At its peak, the network included approximately 260,000 hijacked routers, IP cameras, DVRs, and network-attached storage drives, the majority located in the United States. The botnet ran on a modified version of the Mirai malware family, designed to infect Linux-based IoT devices.

In September 2024, the FBI obtained court authorization to remotely disinfect thousands of US-based devices as part of a coordinated disruption operation. FBI Director Christopher Wray announced the takedown at the Aspen Cyber Summit, publicly identifying Flax Typhoon as a PRC state-sponsored group for the first time. The Chinese government responded by dismissing the FBI’s characterization as “disinformation.” The botnet infrastructure itself was used to proxy attacks against government and defense contractor networks, allowing operators to route malicious traffic through ordinary American households, making attribution and blocking extraordinarily difficult.

Salt Typhoon: The Worst Telecom Hack in US History

Salt Typhoon represents the most consequential of the three campaigns by almost any measure. Linked to China’s Ministry of State Security (MSS), the group compromised at least nine major US telecommunications providers β€” including AT&T, Verizon, Lumen Technologies, and T-Mobile β€” and affected carriers in dozens of additional countries. The breach was first reported by The Washington Post in August 2024 and was publicly confirmed by AT&T and Verizon by late December of that year.

The attack path was sophisticated: Salt Typhoon exploited a zero-day vulnerability in Versa Director, a network management platform, as well as unpatched vulnerabilities in Fortinet and Cisco devices β€” network-layer equipment that is functionally analogous to high-end routers. By hijacking a single high-level, unprotected network management account at AT&T, the group cascaded access to over 100,000 additional routers within the carrier’s infrastructure. The attackers had access for well over a year before Microsoft threat researchers detected the intrusions.

The data harvested was staggering: metadata from over a million calls and text messages, phone records of staffers from the 2024 presidential campaigns of both Kamala Harris and Donald Trump, and β€” most alarming β€” access to the CALEA wiretap systems used by US law enforcement and intelligence agencies for court-authorized surveillance. Officials warned that the attackers may have obtained a near-complete list of individuals under active federal surveillance, information that could be used to identify US intelligence sources and methods.

⚑
Volt Typhoon TTPs
Living Off the Land (LOTL) attacks; uses native Windows tools; targets end-of-life SOHO routers as traffic relays; 5-year persistence documented.
🌐
Flax Typhoon Reach
~260,000 compromised consumer devices; Mirai-based malware; routers, cameras, DVRs, NAS drives; front company Integrity Technology Group.
πŸ“‘
Salt Typhoon Victims
9+ US telecoms including AT&T, Verizon, Lumen, T-Mobile; access to CALEA federal wiretap systems; 1M+ call records harvested.
πŸ”‘
Common Entry Vector
Unpatched consumer and enterprise routers; end-of-life firmware; no MFA on network management accounts; default credentials.

πŸ” What the Government’s Own Reports Say

CISA Advisory AA24-038A (February 2024, joint with NSA and FBI): “Volt Typhoon has compromised the IT environments of multiple critical infrastructure organizations… The US authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions.”

FBI Joint Advisory AA24-249A (September 2024): “PRC state-sponsored cyber actors have compromised and maintained persistent access to US and allied critical infrastructure… using consumer routers infected with Mirai-based malware as anonymizing proxy infrastructure.”

CISA Advisory AA25-239A (September 2025): “These actors often modify routers to maintain persistent, long-term access to networks.”

Senate Intelligence Committee, Senator Mark Warner (December 2024): “This is the worst telecom hack in our nation’s history β€” and the full scope of the damage is still being assessed.”

02
The FCC’s Ban: What It Covers and What It Doesn’t

The FCC’s March 2026 order is sweeping in scope but precise in its application. The ban prohibits the sale of new consumer-grade routers in which “any major stage of the process through which the device is made, including manufacturing, assembly, design and development” occurs outside the United States. This definition β€” deliberately broad β€” effectively targets the entire current market. Nearly every router sold in America today is manufactured, assembled, or engineered at least in part outside US borders.

The specific companies most directly in the crosshairs are those the FCC had already placed on its “Covered List” of equipment deemed national security risks: Huawei Technologies, ZTE Corporation, Hytera Communications, Hikvision, and Dahua Technology. These companies have been barred from the FCC equipment authorization program since 2021. TP-Link Systems β€” which held an estimated 65% of the US consumer router market and had been under active investigation by the Commerce, Defense, and Justice Departments since late 2024 β€” was a principal accelerant behind the broader action. However, the new order’s scope extends well beyond Chinese brands. Asus (Taiwan), D-Link (Taiwan), Netgear (US-designed, Asian-manufactured), and even Amazon’s Eero brand are all affected, since their devices are produced offshore.

Critically, the ban applies only to new router models not previously authorized by the FCC. Existing routers already in use, and older models already on the market before the order’s effective date, are not subject to recall or mandatory replacement. Router manufacturers may apply for an exemption, subject to approval by the Pentagon β€” a high bar that reflects the national-security framing of the action. As of the order’s publication, no exemptions had been granted.

“I welcome this Executive Branch national security determination, and I am pleased that the FCC has now added foreign-produced routers, which were found to pose an unacceptable national security risk, to the FCC’s Covered List.”

β€” FCC Chair Brendan Carr, March 2026

For businesses, the implications are both immediate and long-term. Enterprises reliant on foreign-manufactured network equipment for branch offices, retail locations, and small-office deployments face significant procurement challenges as the supply chain adjusts. The order has also reignited debate about whether the US has the domestic manufacturing capacity to fill the gap β€” a question that industry analysts say will take years, not months, to resolve. In the interim, the FCC guidance is clear: existing devices may remain in service, but organizations should prioritize patching, firmware updates, and segmentation of any foreign-made networking equipment in their infrastructure.

03
The Devices In Your Home That Are Exposed Right Now

Smart home IoT devices

The FCC ban focuses on routers because routers are the documented attack vector β€” but the threat landscape inside a typical American home is considerably wider. The Flax Typhoon botnet, for example, enrolled not just routers but IP cameras, digital video recorders, and network-attached storage drives. Every internet-connected device is a potential foothold, and the security posture of these devices remains, on average, dreadful.

Smart TVs have become a particular concern. Nearly all major smart TV platforms β€” including those manufactured by Hisense, TCL, and some Vizio product lines β€” are produced in China and ship with firmware that security researchers have found difficult to audit. Smart TVs are persistently connected, rarely patched, and frequently granted network access that far exceeds what their function requires. They are, in a meaningful sense, under-scrutinized routers with screens.

IP security cameras from manufacturers like Hikvision and Dahua β€” both already on the FCC Covered List β€” represent another large exposure surface. Hikvision cameras alone are estimated to account for hundreds of thousands of active installations across US residential and commercial properties. Both companies have faced US government sanctions and restrictions, yet their devices remain widely in service due to long replacement cycles and cost barriers.

Network-attached storage (NAS) devices from Chinese-manufactured brands have been documented as Flax Typhoon botnet nodes. These devices β€” used by households and small businesses to store backups, media, and sensitive files β€” often run Linux-based firmware, sit persistently on the network, and are infrequently updated. Their combination of always-on connectivity, local data access, and poor patching hygiene makes them an ideal target for persistent compromise.

The common thread across all these device categories is the same vulnerability that enabled the three Typhoon campaigns: unpatched firmware, default credentials, inadequate authentication, and a consumer market that has never meaningfully priced security into purchasing decisions. The FCC’s router ban addresses one corner of this problem. The rest remains largely unlegislated.

πŸ›‘οΈ What You Should Do Now

1
Audit your router immediately. Log in to your router’s admin panel and confirm it is running the latest available firmware. If your router is end-of-life (the manufacturer no longer issues updates), replace it β€” an unpatched router is an open door. Check your router model against CISA’s Known Exploited Vulnerabilities catalog at cisa.gov/known-exploited-vulnerabilities-catalog.
2
Change default credentials β€” everywhere. Volt Typhoon and Flax Typhoon both exploited devices running factory-default usernames and passwords. Change the admin password on your router, all IP cameras, NAS devices, and smart home hubs. Use a unique, strong password for each device.
3
Disable remote management on your router. Unless you have a specific need, disable remote administration features (often labeled “Remote Management” or “WAN-side access”) in your router settings. Volt Typhoon frequently gained initial access via exposed remote management interfaces.
4
Segment your IoT devices onto a separate network. Most modern routers support a “guest network” or VLAN. Put all smart TVs, cameras, and IoT devices on an isolated network segment that cannot communicate with your computers and phones. This limits lateral movement if any one device is compromised.
5
Check whether your router or cameras appear on the FCC Covered List or CISA advisories. If you own Hikvision or Dahua security cameras, or a TP-Link router purchased before the FCC ban, these devices have documented security concerns and should be prioritized for replacement. Refer to fcc.gov/supplychain for the official Covered List.
6
For businesses: review your entire network equipment inventory. Any foreign-manufactured networking equipment β€” routers, switches, managed Wi-Fi access points β€” should be assessed against the latest CISA and NSA guidance. Prioritize replacement of end-of-life devices, enforce MFA on all network management accounts, and monitor for the LOTL techniques documented in CISA Advisory AA24-038A.

πŸ“‹ Router Brands: FCC Coverage Status
Brand Origin FCC Status Notes
TP-Link Systems China (US HQ) β›” Affected Primary investigation target; ~65% US market share
Huawei China β›” Covered List Barred from FCC auth program since 2021
ZTE China β›” Covered List Barred from FCC auth program since 2021
Asus Taiwan / China MFG ⚠ New Models Affected Assembled outside US; existing models unaffected
Netgear US Design / Asia MFG ⚠ New Models Affected Manufacturing overseas; seeking exemption
D-Link Taiwan / China MFG ⚠ New Models Affected Multiple end-of-life models with known CVEs
Eero (Amazon) US Design / Asia MFG ⚠ New Models Affected Manufactured outside US; existing units grandfathered
US-Made (pending MFG shift) United States βœ… Compliant Very limited availability as of March 2026; market adjusting

Frequently Asked Questions

1
What exactly did the FCC ban?
The FCC’s March 2026 order bans the sale of new consumer-grade Wi-Fi routers where any major stage of manufacturing, assembly, design, or development occurs outside the United States. It does not require recall or replacement of existing routers already in service, and it does not apply to router models that already had FCC equipment authorization before the order’s effective date. Manufacturers may apply for Pentagon-reviewed exemptions, but none have been granted as of publication.
2
Are TP-Link routers still safe to use?
Existing TP-Link routers are not subject to mandatory recall under the FCC order. However, TP-Link devices were the subject of active federal investigation by three separate departments, and CISA has documented vulnerabilities in TP-Link firmware. The practical security recommendation is to ensure your TP-Link firmware is fully up to date, disable remote management, change the default admin password, and begin planning for replacement with a device from a manufacturer not under active federal security review. Do not use any TP-Link router that has reached end-of-life status without an active firmware update program.
3
Did the Typhoon attacks actually succeed?
Yes, in documented and confirmed ways. Volt Typhoon achieved multi-year persistent access to US critical infrastructure networks, with CISA confirming compromises in energy, communications, water, and transportation sectors. Flax Typhoon successfully enslaved approximately 260,000 consumer devices into a functional botnet before an FBI court-authorized disruption operation in September 2024. Salt Typhoon successfully breached at least nine US telecom carriers, accessed federal wiretap systems, and harvested metadata from over a million communications β€” a breach that Senator Mark Warner called the worst telecom hack in US history. Full remediation is still ongoing across multiple carriers as of early 2026.
4
What should I replace my router with?
This is genuinely difficult advice to give in March 2026, because the FCC ban has disrupted the normal supply chain and few fully compliant US-manufactured alternatives are yet widely available. In the short term, security experts recommend prioritizing open-source firmware alternatives (like OpenWrt) on existing hardware from brands not on the Covered List, or considering enterprise-grade SOHO routers from vendors like Cisco Meraki, Ubiquiti, or Firewalla β€” which, while not immune from the manufacturing question, have stronger security update cadences and more transparent vulnerability disclosure programs. Watch for FCC-approved exempt models as the market adjusts over the coming months.

πŸ”’

Stay Informed on Security & Privacy

Sara Voss covers the security and privacy stories that matter before they become headlines. Subscribe for in-depth investigative reports on the threats shaping the digital landscape.

Read Security Reports β†’

πŸ“Ž Sources & Primary References

  1. CISA Advisory AA24-038A β€” “PRC State-Sponsored Actors Compromise and Maintain Persistent Access to US Critical Infrastructure,” CISA/NSA/FBI Joint Advisory, February 7, 2024. cisa.gov/news-events/cybersecurity-advisories/aa24-038a
  2. CISA Advisory AA25-239A β€” “Countering Chinese State-Sponsored Actors Compromise and Maintain Persistent Access to Routers and IoT Devices,” September 2025. cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  3. FBI Joint Advisory AA24-249A β€” “People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations,” September 18, 2024. fbi.gov/news/stories/fbi-director-announces-chinese-botnet-disruption
  4. US Department of Justice Press Release β€” “Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers,” September 18, 2024. justice.gov/archives/opa/pr/court-authorized-operation-disrupts-worldwide-botnet
  5. FCC Equipment Authorization Order DA-26-278 β€” Consumer Router National Security Determination, March 23, 2026. docs.fcc.gov/public/attachments/DA-26-278A1.pdf
  6. CNET β€” “FCC Bans Foreign-Made Routers as a National Security Risk,” March 2026. cnet.com/home/internet/fcc-bans-foreign-made-routers-as-national-security-risk
  7. Wikipedia / Reuters β€” “2024 Global Telecommunications Hack (Salt Typhoon),” continuously updated. en.wikipedia.org/wiki/2024_global_telecommunications_hack
  8. The Wall Street Journal β€” “U.S. Wiretap Systems Targeted in China-Linked Hack,” October 5, 2024.
  9. Senator Mark Warner, Senate Intelligence Committee Statement, December 2024.
  10. US Treasury OFAC β€” Sanctions on Integrity Technology Group (Flax Typhoon front company), January 2025.
πŸ“š Related Reading on Networkcraft
β†’

The Weekly Brief #001: FCC router ban and the sovereignty theme
The editorial desk’s take on why the router ban is part of a broader geopolitical technology shift.
β†’

Why AI agents represent the real national security frontier
Maya Chen on the AI capabilities that matter most β€” and the infrastructure gaps that leave systems exposed.
β†’

AI infrastructure startups solving the security-by-design problem
Alex Rivera on the startups building AI systems with security architecture at their foundation.

Written by Sara Voss
https://networkcraft.net/author/sara-voss/
Investigative Tech Reporter at Networkcraft. The most important security story is usually the one nobody's covering yet. Specialises in cybersecurity, digital privacy, data breaches, and the policy decisions that shape how technology affects civil liberties.