Chinese Botnet Operations disrupted by US Authorities

Chinese Botnet Operations disrupted by US Authorities


The U.S. government has disrupted a botnet that was used by a Chinese state-sponsored hacking group to disguise its activities targeting critical infrastructure.

The botnet that the government disrupted consisted of several hundred SOHO, or small office and home office, routers installed in the U.S. Most of the routers were made by Cisco and Netgear. The devices could be compromised because they had reached end-of-life status, meaning they no longer receive security patches.

The Justice Department detailed that the botnet was created by a Chinese state-sponsored hacking group known as Volt Typhoon. The group used the breached routers to conceal the origin of a cyberattack campaign directed at U.S. critical infrastructure.

Advertisements

According to Microsoft, Volt Typhoon has been targeting critical infrastructure organizations in Guam and other parts of the U.S. The affected organizations are active in the communications, manufacturing, utility, transportation, construction, maritime, government, technology, and education sectors.

The operation to take down the group’s router botnet was launched last month by the FBI, and then they took over a server that Volt Typhoon had used to control the infected routers. Officials then sent commands to the routers that disconnected them from the botnet.

The FBI reportedly also uninstalled a malicious virtual private network, or VPN, tool that the hackers had installed on the compromised devices. The changes will prevent Volt Typhoon from reconnecting the routers to the botnet. For added measure, officials have notified the users whose routers were compromised by the hackers.

Advertisements

The CISA and the FBI today released new guidance for network equipment makers. Officials are advising SOHO router manufacturers to implement an automated patching mechanism in their devices. The guidance also emphasizes the need for secure default settings, as well as features that prevent hackers from remotely accessing a router’s management console

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.