·

China Is Studying How to Hack and Crash Western Power Grids

Time to read:

18–28 minutes

Word count:

4,336 words

June 19, 2025

Over the past several weeks, I’ve been conducting a large-scale bibliometric study on publicly available Chinese academic literature related to hacking and crashing Western power grids. In this article, I’m sharing the main findings of that study.

EDIT (24.6.2025, 10:42 CET): All of the Chinese academic articles I examined are either scientific, peer-reviewed articles published in impact-factor journals (mostly Western publishers), which go through independent review by at least three independent reviewers before being published; or conference proceedings which are also reviewed. In this case, it is not possible for something to be presented by Chinese merely to incite fear or to confuse us— impacted technical scientific literature simply does not work that way.

Research That Should Raise Red Flags


Example of a keyword co-occurrence map based on Chinese-affiliated publications referencing the U.S. Power Grid (367 scientific papers, filtered to 167 unique keywords), notice the problematic terms like “cascading failure”, “outages” or “vulnerability” marked in red

Let the Papers Speak

The list “Selected statements from the manually reviewed Chinese academic literature (non-exhaustive)” in the chapter below presents a selection of direct statements from Chinese-authored research papers that I manually reviewed. I chose to include the original statements from these publications so readers can see for themselves what is being studied. The intent behind these studies may be debatable, but the content itself is not.

Many of these studies openly describe how to identify the most critical nodes in the power grid, simulate targeted failures, or inject malicious data to mislead control systems. Others go further, modeling how to trigger cascading blackouts to destroy the power grid. What these papers focus on, how they’re structured, and the language they use make clear that many are systematically analyzing how to crash or destabilize power grids. The most troubling thing is that they are using realistic U.S. and European power grid models as test cases.

Some might argue that these realistic Western power grid models are widely used in the scientific community as standardized benchmarks for testing. That is true. And it makes perfect sense for Western researchers to use them as benchmarks, after all, these systems reflect their own infrastructure and help evaluate how attacks or deterrence methods would perform in real-world conditions. But for Chinese researchers, the same logic doesn’t hold.

China’s power grids are fundamentally different from those in the West—in its physical architecture, grid topology, energy mix, market design, and even regulatory framework. Simulating attacks or cascading failures on Western grid models tells Chinese researchers little about how their own power grid would behave. So, the question remains: why such intense focus on our power grids?

If the intentions were purely theoretical or methodological, one would expect Chinese researchers to apply their simulations to Chinese power grid models, or at least neutral, abstract power grid models. And yes, those generic country-agnostic models exist. Instead, we see repeated use of real-world Western infrastructure.

Another thing is that while Western researchers typically simulate an attack and then propose countermeasures, many (though not all!) Chinese studies carry out the attack without subsequently suggesting any countermeasures.

Connections to Chinese universities linked to defence and intelligence institutions

Deterrence Begins with Recognizing That Capability Outweighs Intent

What makes this research body particularly concerning is not just the technical detail, but the fact that it is being conducted on a scale, over a span of years, and using real Western power grid data from publicly accessible models. It suggests a deliberate and sustained effort to build a playbook for disruption, whether or not it is ever put into practice.

It is important to stress that these are open-source publications, and no direct operational linkage to Chinese state-sponsored activity is implied. However, in the context of confirmed intrusions into Western critical infrastructure by Chinese actors, and ongoing concerns about prepositioning for future disruption, the convergence between academic research and real-world capability cannot be ignored. At the same time, the risk is amplified by the West’s growing dependence on Chinese-made technologies in the energy sector, which increases the attack surface and creates dependencies that may be strategically exploited.

The intent may remain uncertain, but the capability is now well-documented. They look prepared. Are we?

And one last point: this is just the publicly available stuff. Makes you wonder what they’re working on behind closed doors.

Selected statements from the manually reviewed Chinese academic literature (non-exhaustive)

Answering the most common questions I received after publishing this

Where did you get the idea to start looking into this?

The idea emerged partly out of necessity and partly by coincidence. In discussions on power grid security in which I was involved, Chinese risks were often downplayed due to the absence of evidence of destructive capabilities comparable to that attributed to Russian or Iranian actors. Documented cases of Chinese cyber espionage were considered insufficient grounds for stricter regulation of Chinese technologies in power systems. I did not agree with this assessment. On the contrary, various indicators suggested to me that Chinese actors are fully capable of destructive activity, which led me to look for concrete evidence across available sources.

But all of this raised a broader question for me: what happened after that? Did research focused on identifying vulnerabilities in Western power grids continue? And did it expand beyond the United States to include Europe?

This line of reasoning ultimately led to my study. To back it up with some evidence, the screenshot below captures message exchange with my friend in Tel Aviv, with whom I am working on power grid security issues, at the point when it became clear that the publication I had encountered was not an isolated case but part of a broader and more systematic research effort warranting closer examination (03/2025).

Some publications are conference papers, I find it difficult to assess the importance of these papers, although I know that in some academic fields conference papers are as important as journal papers.

It’s true that some of the publications are conference papers, and I understand that their importance can vary a lot depending on the field, in some areas they are highly regarded, in others less so. But in the context of my research, the academic quality or prestige of the outlet is not what I am trying to measure.

My focus is entirely different: I am looking for indicators that certain topics are being studied at all. From a national security perspective, the fact that a research stream exists, even if it appears only in a conference paper of modest quality, already signals institutional or even state-level support for that line of research. That is what matters in this study.

In other words, I am not asking ‘How good is this research?’, but rather ‘What capabilities are being developed, and where?’ The mere presence of publications, regardless of their quality, is itself a red flag, because it shows attention and resources are being directed to those areas by actors such as defense universities like NUDT or state-linked corporation like China State Grid Corporation.

And again, it is important to keep two things in mind: I manually reviewed the ‘sensitive’ papers to avoid any mistakes, and at the same time, what I found still comes only from open sources. Given that many of the authors come from defense universities or state-owned enterprises, I believe there is also a risk that far more catastrophic scenarios are being simulated secretly, with the support of intelligence information gathered over many years of espionage conducted by China in the EU and the US.

You focused on Chinese research publications, but did you have some sort of control group, such as US or European researchers focusing on cyber security and using keywords such as cascading failures (in the Chinese grid)? This to have a benchmark comparing Chinese and Western publications.

This question goes in a different direction from the original purpose of my research, which was focused on what our adversary is doing. Still, I had similar concern when I did the research, so I specifically checked whether there were any Western studies that tested attacks or similar scenarios on the Chinese grid. I did not find a single one. The reason, I believe, is that China heavily censors any information related to its critical infrastructure. I do not think Western researchers could ever realistically obtain Chinese grid data or simulate it, given the restrictions in China.


In section 4.2 you present the evolution of research priorities. The conclusion is that priorities shift. But do the findings from all designated periods still apply (e.g. as risks or threats)? What about the older papers (before 2016)? Do the findings still apply (and pose a threat to the grid)? 

Yes, they only evolve over time. For example, a cross-cutting theme across publications has been cascading failures, but false data injection attacks are a relatively new issue of just the last 2–3 years. So yes, the threat remains, but the specific techniques are changing. And in general, yes, most of them are still valid because we have not yet fully transformed power grids from the old model we used in the past to the new digitalized one. We are in a kind of transitional phase of an incompletely transformed grid, which means that we are currently exposed both to old threats and to new emerging threats.

Discover more from The Grid Warfare Project

Subscribe now to keep reading and get access to the full archive.

Continue reading