September 19th, 2024

China-state IoT botnet went undetected for four years–until now

The FBI dismantled the Raptor Train botnet, linked to Chinese hackers, involving over 260,000 devices. It targeted government and corporate entities, exploiting reputable IP addresses to evade detection.

Read original articleLink Icon
China-state IoT botnet went undetected for four years–until now

The FBI has dismantled a significant botnet named Raptor Train, which was operated by Chinese state-sponsored hackers for four years. This botnet primarily comprised small office and home office devices, including routers and surveillance cameras, with over 260,000 devices involved globally. At its peak in June 2023, Raptor Train had more than 60,000 compromised devices, making it the largest known botnet linked to the Chinese state. The hackers, associated with a group called Volt Typhoon, exploited the botnet to launch attacks on various targets, including government agencies and corporations in the US and Taiwan. The botnet's structure allowed it to evade detection by appearing to originate from reputable IP addresses. The FBI, along with the Cyber National Mission Force and the NSA, identified the China-based Integrity Technology Group as the controlling entity of Raptor Train, which utilized state-controlled IP addresses for its operations. FBI Director Christopher Wray highlighted the botnet's impact on critical infrastructure and the significant resources victims had to expend to mitigate the damage caused by these cyberattacks.

- The FBI dismantled the Raptor Train botnet linked to Chinese state-sponsored hackers.

- The botnet included over 260,000 compromised devices, primarily in North America and Europe.

- Raptor Train was used to target government agencies and corporations, facilitating data exfiltration.

- The botnet's structure allowed it to evade detection by using reputable IP addresses.

- Integrity Technology Group was identified as the controlling entity behind the botnet.

Link Icon 0 comments