Other
CISA
Primary Source βIncident Details
In September 2024, the FBI and CISA announced the disruption of a botnet operated by Flax Typhoon, a Chinese state-sponsored threat actor (also tracked as RedJuliett/Ethereal Panda). The botnet, dubbed ‘Raptor Train’ by security researchers at Black Lotus Labs, compromised over 260,000 internet-connected devices including home routers, IP cameras, DVRs, and NAS drives β primarily exploiting default credentials and known CVEs in SOHO/IoT devices. The botnet infected devices in North America (48%), Europe, Asia, and elsewhere, and was used to conduct espionage and facilitate attacks on US critical infrastructure, defense, education, and telecom sectors. Court-authorized actions were taken to disrupt the botnet in September 2024. Flax Typhoon is distinct from Volt Typhoon but pursues similar pre-positioning goals against critical infrastructure.
Technical Details
- Initial Attack Vector
- CWE-1188: Insecure Default Initialization of Resource (compromised SOHO routers and IoT devices with default/weak credentials)
- Vendor / Product
- Consumer and SOHO routers, IP cameras, DVRs (multiple vendors)
- Malware Family
- Flax Typhoon botnet (Raptor Train)
Timeline
- 2023-06-01 Breach occurred
- 2024-09-18 Publicly disclosed
- unknown Customers notified