pwshub.com

Massive China-state IoT botnet went undetected for four years—until now

OVER 260,000 PWNED —

75% of infected devices were located in homes and offices in North America and Europe.

Massive China-state IoT botnet went undetected for four years—until now

Getty Images

The FBI has dismantled a massive network of compromised devices that Chinese state-sponsored hackers have used for four years to mount attacks on government agencies, telecoms, defense contractors, and other targets in the US and Taiwan.

The botnet was made up primarily of small office and home office routers, surveillance cameras, network-attached storage, and other Internet-connected devices located all over the world. Over the past four years, US officials said, 260,000 such devices have cycled through the sophisticated network, which is organized in three tiers that allow the botnet to operate with efficiency and precision. At its peak in June 2023, Raptor Train, as the botnet is named, consisted of more than 60,000 commandeered devices, according to researchers from Black Lotus Labs, making it the largest China state botnet discovered to date.

Burning down the house

Raptor Train is the second China state-operated botnet US authorities have taken down this year. In January, law enforcement officials covertly issued commands to disinfect Internet of Things devices that hackers backed by the Chinese government had taken over without the device owners’ knowledge. The Chinese hackers, part of a group tracked as Volt Typhoon, used the botnet for more than a year as a platform to deliver exploits that burrowed deep into the networks of targets of interest. Because the attacks appear to originate from IP addresses with good reputations, they are subjected to less scrutiny from network security defenses, making the bots an ideal delivery proxy. Russia-state hackers have also been caught assembling large IoT botnets for the same purposes.

An advisory jointly issued Wednesday by the FBI, the Cyber National Mission Force, and the National Security Agency said that China-based company Integrity Technology Group controlled and managed Raptor Train. The company has ties to the People's Republic of China, officials said. The company, they said, has also used the state-controlled China Unicom Beijing Province Network IP addresses to control and manage the botnet. Researchers and law enforcement track the China-state group that worked with Integrity Technology as Flax Typhoon. More than half of the infected Raptor Train devices were located in North America and another 25 percent in Europe.

Enlarge / Raptor Train concentration by continent.

IC3.gov

Enlarge / Raptor Train concentration by country.

IC3.gov

"Flax Typhoon was targeting critical infrastructure across the US and overseas, everyone from corporations and media organizations to universities and government agencies," FBI Director Christopher Wray said Wednesday at the Aspen Cyber Summit. "Like Volt Typhoon, they used Internet-connected devices, this time hundreds of thousands of them, to create a botnet that helped them compromise systems and exfiltrate confidential data." He added: "Flax Typhoon's actions caused real harm to its victims who had to devote precious time to clean up the mess."

Page: 1 2 3 4 Next →

Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at @dangoodin on Mastodon. Contact him on Signal at DanArs.82.

Source: arstechnica.com

Related stories
1 month ago - Because clearly it's better for Beijing to know who you are than for every ISP and social service to keep its own records Beijing may soon issue "cyberspace IDs" to its citizens, after floating a proposal for the scheme last Friday.…
1 month ago - No, no, go ahead, don't let us stop you, Xi Cyber-spies suspected of connections with China have infected "dozens" of computers belonging to Russian government agencies and IT providers with backdoors and trojans since late July,...
21 hours ago - FBI Director hails successful action but calls it “just one round in a much longer fight.”
1 month ago - Yes, it's a real recall. — The problem seems more prevalent in China than elsewhere, "for reasons unknown." ...
3 weeks ago - A federal judge recently sentenced 53-year-old Shan Hanes, former CEO of Heartland Tri-State Bank (HTSB) in Elkhart, Kansas, to 24 years in prison after he illegally wired $47.1 million as part of a cryptocurrency scam, leading to the...
Other stories
5 minutes ago - To be fair, Joe was probably taking a nap The Iranian cyber snoops who stole files from the Trump campaign, with the intention of leaking those documents, tried to slip the data to the Biden camp — but were apparently ignored, according...
38 minutes ago - iOS and Android — People have been complaining about some of the issues since at least April. Enlarge...
38 minutes ago - Enlarge / Sometimes this is all you need.Aurich Lawson | Getty Image Remy Ra St. Felix spent April 11, 2023, on a quiet street in a rented BMW X5,...
53 minutes ago - The European Commission intends to force Apple to open its walled garden. On Thursday, the EU's executive arm said it initiated "two specification...
1 hour ago - Will Tariq St. Patrick wind up like his father? Keep watching until the series finale in October.