China Is Studying How to Hack and Crash Our Power Grids


Over the past several weeks, I’ve been conducting a large-scale bibliometric study on publicly available Chinese academic literature related to hacking and crashing Western power grids. In this article, I’m sharing the main findings of that study.



EDIT (20.6.2025, 8:54 CET): All of the Chinese academic articles I examined are scientific, peer-reviewed articles published in impact-factor journals (mostly Western publishers), which go through independent review by at least three independent reviewers before being published. In this case, it is not possible for something to be presented by Chinese merely to incite fear or to confuse us— impacted technical scientific literature simply does not work that way.

What I found is a vast body of technically advanced work. Across dozens of publications, Chinese researchers study how failures propagate through the Western power grids, how critical nodes or links can be identified and targeted, and how to optimize the effectiveness of these attacks. In many cases, simulations are conducted specifically to identify the minimal effort or cost required to trigger a large-scale outage or systemic collapse. Many papers simulate targeted or hybrid attacks, such as node removal, edge overload, or false data injections. Several studies explicitly focus on identifying the most effective attack vectors under constraints such as limited resources, partial system knowledge, or time sensitivity. Some publications models control algorithms that minimize the number of manipulated nodes needed to induce power grid-wide failure.

This research alone would already be cause for concern. But paired with what we know from real-world Chinese cyber operations like Volt, Flax and Salt Typhoon, the picture becomes much more concerning. Over the past years, U.S. officials have confirmed that Chinese hackers have infiltrated American critical infrastructure, and that they were prepositioning for future disruption. Similar concerns regarding infiltration of critical infrastructure are beginning to surface in Europe, although the confirmed intrusions remain less public.

What amplifies this threat even further is how deeply Western energy infrastructure is being built on Chinese-made technologies. From solar inverters to battery energy storage systems, critical components of the green transition increasingly rely on Chinese hardware and software solutions – often with remote access capabilities – to the point where we might as well call it the Red Deal instead of the Green Deal. This growing dependency could serve as a force multiplier for the attacks modeled in these very publications.

The warning signs are clear. Chinese scholars have built a vast body of detailed, simulation-based research on how to destabilize Western power grids, meanwhile Chinese cyber operators have already proven capable of gaining access to the very same real systems. Whether or not they plan to act, the mere existence of such capability demands serious defensive preparation.


Research That Should Raise Red Flags​


My analysis started with the Scopus academic database, filtering for Chinese-authored publications that included the keyword 'power grid' alongside keywords pointing to foreign power grids, such as 'U.S.' or 'Europe'. The numbers alone were telling: 367 publications focused on the U.S. grids, and 166 on the European grids, authored over the last two decades.

To get a clearer picture of the research themes, I used automated tool for bibliometric analysis called VOSViewer to examine the keywords used across the publications. This involved identifying which terms appeared most frequently and which ones commonly occurred together. The goal was to uncover patterns in how Chinese researchers approach the topic of foreign power grids. When I visualized the keyword map, a troubling pattern emerged: terms like “cascading failure,” “outages,” and “vulnerability” were clearly heavily present, see the screenshot below for an example.

While the keyword analysis revealed a worrying trend, the real insight came later through a closer examination of the papers themselves. To move beyond surface-level analysis, I manually reviewed the full text of publications that contained the most concerning keywords—particularly those suggesting an interest in disruption, attacks, failures and vulnerabilities.

1750362355088.webp
Example of a keyword co-occurrence map based on Chinese-affiliated publications referencing the U.S. Power Grid (367 scientific papers, filtered to 167 unique keywords), notice the problematic terms like “cascading failure”, “outages” or “vulnerability” marked in red

Let the Papers Speak​


The list "Selected statements from the manually reviewed Chinese academic literature (non-exhaustive)" in the chapter below presents a selection of direct statements from Chinese-authored research papers that I manually reviewed. I chose to include the original statements from these publications so readers can see for themselves what is being studied. The intent behind these studies may be debatable, but the content itself is not.

Many of these studies openly describe how to identify the most critical nodes in the power grid, simulate targeted failures, or inject malicious data to mislead control systems. Others go further, modeling how to trigger cascading blackouts to destroy the power grid. What these papers focus on, how they’re structured, and the language they use make clear that many are systematically analyzing how to crash or destabilize power grids. The most troubling thing is that they are using realistic U.S. and European power grid models as test cases.

Some might argue that these realistic Western power grid models are widely used in the scientific community as standardized benchmarks for testing. That is true. And it makes perfect sense for Western researchers to use them as benchmarks, after all, these systems reflect their own infrastructure and help evaluate how attacks or deterrence methods would perform in real-world conditions. But for Chinese researchers, the same logic doesn’t hold.

China’s power grids are fundamentally different from those in the West—in its physical architecture, grid topology, energy mix, market design, and even regulatory framework. Simulating attacks or cascading failures on Western grid models tells Chinese researchers little about how their own power grid would behave. So, the question remains: why such intense focus on our power grids?

If the intentions were purely theoretical or methodological, one would expect Chinese researchers to apply their simulations to Chinese power grid models, or at least neutral, abstract power grid models. And yes, those generic country-agnostic models exist. Instead, we see repeated use of real-world Western infrastructure.

Deterrence Begins with Recognizing That Capability Outweighs Intent​


What makes this research body particularly concerning is not just the technical detail, but the fact that it is being conducted on a scale, over a span of years, and using real Western power grid data from publicly accessible models. It suggests a deliberate and sustained effort to build a playbook for disruption, whether or not it is ever put into practice.

It is important to stress that these are open-source publications, and no direct operational linkage to Chinese state-sponsored activity is implied. However, in the context of confirmed intrusions into Western critical infrastructure by Chinese actors, and ongoing concerns about prepositioning for future disruption, the convergence between academic research and real-world capability cannot be ignored. At the same time, the risk is amplified by the West’s growing dependence on Chinese-made technologies in the energy sector, which increases the attack surface and creates dependencies that may be strategically exploited.

The intent may remain uncertain, but the capability is now well-documented. They look prepared. Are we?

And one last point: this is just the publicly available stuff. Makes you wonder what they're working on behind closed doors.
 
The biggest flaw in everyone's ideas about this shit (excluding the academic papers from the actual Chinese) is thinking that when the news and experts say Chinese/North Korean/Russian hackers they are actually correct about the origin.
I see where you’re coming from, but I maintain that it is feasible for the experts to pinpoint the most likely origin of the attack based on TTPs (tactics, techniques, and procedures)—some less experienced actors have even used the same virus multiple times—tracing their backers, and even their targets.

For example, North Korea has understandably been less advanced in their cyber warfare capabilities, and have a particular interest in South Korea. A professional with a thorough understanding of the digital footprints of different APTs could easily identify similarities in TTPs with known North Korean cyber espionage attempts in South Korea and those in other regions. North Korea has also exerted particular effort in cyber attacks meant to generate funding for their perpetually poor selves, targeting cryptocurrency platforms, also very unique. Analysts were able to trace the path of crypto in one such attack through several points in China before it was converted into Chinese yuan and deposited in a Chinese city near Sinuiji, NK.
Obviously, they are evolving, and have learned to spoof IP addresses, etc. which makes it slightly harder, but I still hold that we have more knowledge and capability in unmasking them.

In contrast, Russia and China as actors are more advanced, have a more sophisticated repertoire, and have different targets pursuant to their individual goals. Russia stages more disruptive attacks meant to immediately upset ongoing systems and operations. They are more aggressive and confrontational, causing obvious damage, and seek to destroy. As such, they also employ considerable psychological warfare in conjunction with their attacks in cyber space meant to demoralize their target.

China, on the other hand, has arguably more economically driven goals, and has spent the last several decades slowly expanding its influence and dominance in various sectors of the world economy. Snatching up land rich with natural resources (many mines in South America, for example) and undercutting domestic labor and manufacturing costs to become the dominant manufacturing power for important technologies, etc. Under the guise of their Belt and Road Initiative, they were able to install a hell of a lot of dual-use infrastructure and establish an economic and military presence all over the globe. It follows that their cyber attack methods are also more subtle and geared towards ongoing monitoring rather than immediate disruption. The cyber panda “lives off the land” far more than the cyber bear.

The targets of the cyber attacks can also point towards their origin. Knowing that Russia has much less reason to target a place like Guam and knowing that Guam’s proximity to Taiwan makes its U.S. military presence’s response to an invasion attempt on Taiwan very important, one can reasonably surmise that a cyber attack on the U.S.’ military bases there originates from the PRC. The hallmarks of such an attack are then added to the typical profile of Chinese cyber espionage actors, making future attribution that much easier.

Obviously, as all the actors grow and improve their efforts, it can become more difficult to attribute their attacks, but we can still draw reliable conclusions based on targets, methods, and perceivable goals.

Edit—word
 
Last edited:
With how easily they’ve been getting into the country with biological weapons, all they’d have to do is legally buy a gun here and just light up transformers in the distribution/transmission centers all throughout the country. All that crap is old/outdated/defunct. Would be more fun as well, I’d reckon.
 
I see where you’re coming from, but I maintain that it is feasible for the experts to pinpoint the most likely origin of the attack based on TTPs (tactics, tools, and procedures)—some less experienced actors have even used the same virus multiple times—tracing their backers, and even their targets.
Yes but even on this basis alone it makes it easier for other actors to imitate other attackers. There wouldn't be much doubt that 3 letter agencies would want to amass large amounts of cryptocurrency and shit like that for stuff that is off the books (as well as info for blackmail, espionage and such). The same goes with non-US government agencies. And nowadays there are non government actors (private companies, think tanks and that kind of shit) as well - there are tons of super high level hackers in the world, especially cutting edge autistic people who are in high demand.
Russia stages more disruptive attacks meant to immediately upset ongoing systems and operations. They are more aggressive and confrontational, causing obvious damage, and seek to destroy. As such, they also employ considerable psychological warfare in conjunction with their attacks in cyber space meant to demoralize their target.
Alternatively they're just doing a slight of hand to distract from what they're actually doing. Russia and the CIS are a bit weird in that private/mercenary hackers who steal for profit are somewhat ignored so long as they don't attack Russia/Russian users.
The targets of the cyber attacks can also point towards their origin. Knowing that Russia has much less reason to target a place like Guam and knowing that Guam’s proximity to Taiwan makes its U.S. military presence’s response to an invasion attempt on Taiwan very important, one can reasonably surmise that a cyber attack on the U.S.’ military bases there originates from the PRC. The hallmarks of such an attack are then added to the typical profile of Chinese cyber espionage actors, making future attribution that much easier.

Obviously, as all the actors grow and improve their efforts, it can become more difficult to attribute their attacks, but we can still draw reliable conclusions based on targets, methods, and perceivable goals.
The thing is that these hacks have been happening for decades at this point. And it's not just big government secret hacker cells but its also run of the mill scammers using all sorts of social engineering tactics. Some people just gather intel and then sell it onto someone else. And yes you're right that you can sometimes build an idea of who the attacker is likely to be based on the target, but at the same time people will engage in slight of hand shit just to fuck around and its also extremely highly plausible that its just some kid fucking around on his computer:
China, on the other hand, has arguably more economically driven goals, and has spent the last several decades slowly expanding its influence and dominance in various sectors of the world economy. Snatching up land rich with natural resources (many mines in South America, for example) and undercutting domestic labor and manufacturing costs to become the dominant manufacturing power for important technologies, etc. Under the guise of their Belt and Road Initiative, they were able to install a hell of a lot of dual-use infrastructure and establish an economic and military presence all over the globe. It follows that their cyber attack methods are also more subtle and geared towards ongoing monitoring rather than immediate disruption. The cyber panda “lives off the land” far more than the cyber bear.
There is a theory that I have seen that expressed in various forms that while China's obvious goal is probably economic dominance or at least building their defenses so they are a formidable world superpower and can't be screwed with (that is my read of them anyway - because as the saying goes "WW3 will never happen because if no one is left alive then there is no profit to be made") that a large number of the hacks they do aren't technically economic warfare but rather information warfare and that all of the companies they hack into and exfiltrate information is categorized by them and fed into a very private superpower AI that they hold the keys to.

For example, I recall reading that the only way they were able to manufacture a domestic airliner was because they had stolen schematics from other countries. That isn't a warfare use (at least not directly) and does enable them to compete a lot better economically (or at least be far more economically independent from the western world) and those kind of schematics and high-level internal communications from the very best Western companies mean they can presumably start building their own ideas that will leapfrog Western companies (because they never had to pay for the R&D). Having said all that, it doesn't make much sense for China to become totally isolated from the Western world because they still need customers and trading routes just like anyone else does.

If the theory about their private internal AI is grounded in reality (and it is an extremely plausible idea) and learns everything (or close enough) it makes them a formidable world superpower that doesn't actually have to resort to typical warfare and they can make the most balanced, nuanced decisions and be infinitely patient. ChatGPT and Western AI models (at least the public ones) are all fed by public domain knowledge - but if you're a country as large as China and can develop your own superpower AI that is built not only on "public domain" information but extremely high level and extremely proprietary business logic/communications/defense capabilities/economic, government and strategic information then you can basically vastly outpace any other government when it comes to decision making and long term logic. I don't buy the argument that they want to use this for total world domination via actual warfare but I can totally believe that not only does this superlevel AI exist but that they frequently use it, or at least consider its feedback when making highly strategic decisions. They also seem to embark on a secondary layer of deliberately antagonistic and noisy behavior (such as fucking around with Taiwan, antagonizing the fisheries of various countries, very obvious public hacks and so on).

Perhaps a good example of this is when Trump tried to hit them with high tarrifs and instead of sperging as a response they provided highly nuanced counter-offers/negotiations. In many ways its a bit reminiscent of Chile's experimental effort of https://en.wikipedia.org/wiki/Project_Cybersyn (which was cybernetics/highly available information to inform government decisions).

The US and most countries are stuck in perpetual red tape, politics and other shit that slows them down from competing with this kind of thing. The US government can't exactly build an AI that uses privileged information from Microsoft, Google, Netflix, YouTube, Facebook/Meta as well as their manufacturing and economic entities as well as other world information whereas China can.

1750464836493.webp

It should be noted that the US has tons of access to direct internet pipes in various countries so it is actually somewhat plausible that they maybe do actually have something like this but its just very hidden away and obviously companies like Palantir exist - but I am somewhat doubtful that even if some secret project exists like this that they can match up with the highly centralized decision making apparatus of the Chinese government as well as its various proxy countries that it somewhat "owns" via things like the Belt & Road initiative and other things.

Without getting too much into schizo territory (I gather I'm already there though) I can totally see that a government or entity in control of such a vast amount of information wouldn't just use it for what people may think are the most pressing economic and strategic warfare decisions but also in terms of much longer term and broader threat analysis.
As much as WW3 is an evergreen threat to everyone there are now other much more existential threats to us all such as global warming, space/orbit pollution, resource/mineral depletion, food insecurity, shipping route instability pollution in general (even if people don't believe in global warming, increased pollution levels have started to seriously harm/kill people), overpopulation and the indirect threat of global conflict/insecurity that could arise from internal political instability from external countries (for example if another world superpower devolves into a prolonged civil war this may pose a risk because it could prevent shipping lanes from being secured)...

...although COVID presumably came around before the proliferation of functional AI/LLMs (they were only in their infancy at that stage) the owner of such a powerful AI driven by proprietary information from such a broad array of highly valuable sources may be posed with the possibility of non-warfare lines of action in order to stabilize the world and control things like overpopulation etc... ostensibly for "the greater good".

And before anyone calls me super schizo (I know I'm already perhaps a bit deep in that realm with this line of thinking) consider that the best and brightest minds work very silently at companies like Microsoft, Sony, Google, US/other militaries, think tanks, governments and intelligence agencies and they very often work on highly detailed research & development and risk analysis that is buried very deep internally at those organizations...

If you hold the key to this kind of system... what is pretty much the Pandora's Box of being able to not only see vast amounts of that highly secretive and tightly controlled internal paperwork that costs millions and billions of dollars and hundreds of thousands of manhours to create and which is so special that very few people working at those companies will ever even be able to access, see or even have the time to read (because a lot of that type of stuff can be highly damaging for those kind of companies) then you have something no one (or very few other people have): a very exclusive all seeing eye that doesn't require a 100,000 people to parse through manually but just several thousand server racks.
If you had access to that kind of Pandora's box then you'd be able to see and know things that are almost certain to happen based off of the work of the best and brightest minds that no one else even knows about - you'd be able to connect 100 internal research papers from billion dollar company A to 20,000 internal research papers from billion dollar company B and then connect it to 43,000 internal research papers and hardcore sensor data from Government C.
1750464815523.webp

On top of this, if you could weaponize such a system and make it somewhat autonomous you could target not only basically whatever system you want to hack using highly proprietary exploits but you would also start to build a very, very good idea of exactly what systems to target - and you'd be able to use your Gigabrain AI to scan, read and exploit the weakenesses of every single human being who has access to get anywhere close to such a system. Whether its the janitor or some giga-autistic scientist. On top of this you can also start to introduce 0day exploits and weaknesses that you can exploit and other super high level shit at basically any major company you want to, even if it is just done indirectly.

So you not only can see everything, hear everything but you can also basically scan everything and know exactly what to do to make the system gain even more power.

edit: in case anyone is thinking the above is too schizo here's some reading to do:
1750465236904.webp
 
Last edited:
I'm sure a seasoned security professional will correct me but why not just air gap everything? Why must it all be connected to a central place?
One main reason; load management. There are a few sub reasons so here are two.
- Load management within your service territory. You can’t over or under generate for demand without having to deal with the lack or excess of energy which leads to
- energy trading: sell when you’re over capacity snd buy when you’re under. See the Texas ice storm for an extreme example of how expensive it gets to handle load when you can’t generate.

It goes on from there. I’m not going into TMI on this but the bottom line is that metrics and/or generation orders matter. Can’t do that with a true air gap.
 
I can’t reply to your post so I am tagging you, @neger psykolog . I will also respond bit by bit because I have queued up some additional reading material that will take some time to sift through and I want to fully address all the points you made.

There is a theory that I have seen that expressed in various forms that while China's obvious goal is probably economic dominance or at least building their defenses so they are a formidable world superpower and can't be screwed with (that is my read of them anyway - because as the saying goes "WW3 will never happen because if no one is left alive then there is no profit to be made") that a large number of the hacks they do aren't technically economic warfare but rather information warfare and that all of the companies they hack into and exfiltrate information is categorized by them and fed into a very private superpower AI that they hold the keys to.

For example, I recall reading that the only way they were able to manufacture a domestic airliner was because they had stolen schematics from other countries. That isn't a warfare use (at least not directly) and does enable them to compete a lot better economically (or at least be far more economically independent from the western world) and those kind of schematics and high-level internal communications from the very best Western companies mean they can presumably start building their own ideas that will leapfrog Western companies (because they never had to pay for the R&D). Having said all that, it doesn't make much sense for China to become totally isolated from the Western world because they still need customers and trading routes just like anyone else does.
Indeed, China expends tremendous effort in IP theft to bridge its technological gaps—here’s just a small sample that compares different countries’ aircraft’s and what China reverse-engineered or just plain stole and slapped their name on it (lol Israel sold them the plans for one that the US had worked on with them in the 1980s)

As for economic vs information warfare, I think it comes down to semantics and what the end-goal is. China’s end goal does seem to be global dominance, and they engage in multiple kinds of “warfare” (tactics) to achieve that. Warfare in the context of a war that is defined as two or more parties fighting to assert their own influence, be it psychological (propaganda), economic (monopolizing and dominating key sectors), military (establishing military presence), etc.

I don’t think China is trying to isolate itself at all—they are all too eager to get ahead of everyone else and will do anything to achieve that, shamelessly stealing designs.


As for the wider question of AI, I think any government worth its national security salt is secretly working on a large-scale AI model as you describe. Not just China. I can totally see China being less cautious with it, though. I think there is more apprehension in the wider US intelligence community regarding trusting AI to suggest actionable decisions in tactical and strategic planning, and rightly so. Even in its most powerful conception, an AI machine like you describe would still be limited in how accurately it could identify relevant factors in a decision and assign probabilities of the extents of their effects, as well as predicting and ranking possible outcomes in terms of likelihood.

Maybe I’m just an old fart, but I think machine learning still has a ways to go before it reaches a point where it is more credible than the current state of open source AI, much of which seems to boil down to basic data aggregation, and more credible than a team of experienced tacticians. Look at the Tet Offensive, for example. If we look at what amounted to such a huge intelligence failure and try to imagine what an AI would spit out about that situation’s relevant facts, it would still be largely reliant on the flawed and biased information fed to it by its human handlers.
 
Last edited:
  • Like
Reactions: neger psykolog
Maybe I’m just an old fart, but I think machine learning still has a ways to go before it reaches a point where it is more credible than the current state of open source AI, much of which seems to boil down to basic data aggregation, and more credible than a team of experienced tacticians. Look at the Tet Offensive, for example. If we look at what amounted to such a huge intelligence failure and try to imagine what an AI would have spit out about that situation’s relevant facts, it would still be largely reliant on the flawed and biased information fed to it by its human handlers.
It definitely has a ways to go. And real world experience definitely counts for something - but at the same time AI can often see things that humans cannot and if it can notice some super specific weakness or tiny detail that anyone else would overlook then it can avoid a war altogether or provide a window of opportunity that no human realized was there in the first place.
A lot of top companies, governments and militaries genuinely recruit autists and spergs who can do this kind of shit but they simply can't fathom the kind of datasets by themselves - even if you don't use the AI as a decision maker right now you can definitely use it to put the right set of information in front of the expert tactician or autist.
Look at the Tet Offensive, for example. If we look at what amounted to such a huge intelligence failure and try to imagine what an AI would have spit out about that situation’s relevant facts, it would still be largely reliant on the flawed and biased information fed to it by its human handlers.
The thing is such a superpower AI can also be fed with basically almost live real world data like satellite photos and other kind of telemetry. Private companies have been using satellite photos of companies parking lots, stock yards and other shit like that to inform their decisions and obviously the military has been doing it for ages.
It's even a common meme/reality that when serious shit is going down at the Pentagon the surrounding pizza places suddenly get super busy.

AI can look at all of this and more, which of course opens the window to feeding it false information... much like how China deliberately fucks with the coordinate system as it is used in its own country so it makes it harder for people to pinpoint where places even are.
As for economic vs information warfare, I think it comes down to semantics and what the end-goal is. China’s end goal does seem to be global dominance, and they engage in multiple kinds of “warfare” (tactics) to achieve that. Warfare in the context of a war that is defined as two or more parties fighting to assert their own influence, be it psychological (propaganda), economic (monopolizing and dominating key sectors), military (establishing military presence), etc.

I don’t think China is trying to isolate itself at all—they are all too eager to get ahead of everyone else and will do anything to achieve that, shamelessly stealing designs.
I personally just think China is mainly concerned with becoming equal to or greater than the US empire. They already have nuclear capabilities but all the military shit they're building outside of that is probably more just an effort to turn themselves into the world police (which the US used to be). I personally don't think they'll go all out WW3 on their adversaries but are just aiming on slowly wedging themselves into being a country that won't be fucked with anymore.

If I had to guess when it actually comes time for them to take Taiwan not a single shot will be fired and the US and other world powers will just give it up to them.

I think their ambitions also include becoming a more dominant cultural/educational force on the world. Up until now it has basically been the English speaking world who has done that.
 
>"why yes, our power plants must be connected to the internet because it's so convenient"
It's insane. Ask a controls guy in even the most unimportant, non-critical industry if they're willing to connect their PLCs or HMIs to the Internet and they'll say "are you out of your FUCKING MIND?"

And yet they do this to power plants. It boggles the mind.
 
This is more a failure of the government allowing this possible attack vector than China who is really just doing what every nation does and planning for hypothetical conflicts and exploiting the corruptibility of others.
 
  • Like
Reactions: neger psykolog
- energy trading: sell when you’re over capacity snd buy when you’re under. See the Texas ice storm for an extreme example of how expensive it gets to handle load when you can’t generate.
The Texas ice storm incident did indeed cause a failure to generate, but what turned it into a catastrophe was Texas’ long tradition of being completely disconnected from the main two American energy grids because they don’t want federal energy regulators around.

When the ice storms demonstrated that Texas didn’t actually know how to operate energy infrastructure, they couldn’t save their asses by buying power from the energy grids, as the necessary connections didn’t exist.

Nelson says “ha ha”
 
The Texas ice storm incident did indeed cause a failure to generate, but what turned it into a catastrophe was Texas’ long tradition of being completely disconnected from the main two American energy grids because they don’t want federal energy regulators around.

When the ice storms demonstrated that Texas didn’t actually know how to operate energy infrastructure, they couldn’t save their asses by buying power from the energy grids, as the necessary connections didn’t exist.

Nelson says “ha ha”
I know. This is why I didn’t keep going in that post. I was just using it as a an example of trading risk.
 
Back