Other

CISA

πŸ“… 2023-06-01 🏒 Consumer and SOHO routers, IP cameras, DVRs (multiple vendors) 🦠 Flax Typhoon botnet (Raptor Train)
Primary Source β†—

Incident Details

In September 2024, the FBI and CISA announced the disruption of a botnet operated by Flax Typhoon, a Chinese state-sponsored threat actor (also tracked as RedJuliett/Ethereal Panda). The botnet, dubbed ‘Raptor Train’ by security researchers at Black Lotus Labs, compromised over 260,000 internet-connected devices including home routers, IP cameras, DVRs, and NAS drives β€” primarily exploiting default credentials and known CVEs in SOHO/IoT devices. The botnet infected devices in North America (48%), Europe, Asia, and elsewhere, and was used to conduct espionage and facilitate attacks on US critical infrastructure, defense, education, and telecom sectors. Court-authorized actions were taken to disrupt the botnet in September 2024. Flax Typhoon is distinct from Volt Typhoon but pursues similar pre-positioning goals against critical infrastructure.

Technical Details

Initial Attack Vector
CWE-1188: Insecure Default Initialization of Resource (compromised SOHO routers and IoT devices with default/weak credentials)
Vendor / Product
Consumer and SOHO routers, IP cameras, DVRs (multiple vendors)
Malware Family
Flax Typhoon botnet (Raptor Train)

Timeline

  1. 2023-06-01 Breach occurred
  2. 2024-09-18 Publicly disclosed
  3. unknown Customers notified