"It is now clear that Volt Typhoon has functioned by taking control of swathes of vulnerable digital devices around the world - such as routers, modems, and even internet-connected security cameras - to hide later, downstream attacks into more sensitive targets."