This post about Volt Typhoon is interesting based on the concept of using a phantom or fake networks to cloak malicious intent. The idea of having an attacker hide their actions isn’t new. It should make sense that threat actors will try to look as legit as possible to avoid reputation blocking. This post is interesting to see what such networks could look like. See the details via the hackernews post found HERE.