#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39 C
Dubai
Tuesday, July 22, 2025
HomeTopics 1Advanced Persistent ThreatCourt-Authorized Operation Disrupts Global Botnet Run by Chinese State-Sponsored Hackers

Court-Authorized Operation Disrupts Global Botnet Run by Chinese State-Sponsored Hackers

Date:

Related stories

Phish and Chips: China‑Aligned Espionage Surge Targeting Taiwan Semiconductor Industry

Between March and June 2025, Proofpoint researchers tracked three distinct...

Emergency Alert: Critical Unauthenticated RCE Discovered in Cisco ISE/ISE‑PIC

Cisco has patched three severe unauthenticated remote code execution...
spot_imgspot_imgspot_imgspot_img

In a significant win against global cybercrime, the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) announced the disruption of a massive botnet controlled by People’s Republic of China (PRC) state-sponsored hackers. The botnet, consisting of over 200,000 compromised consumer devices worldwide, was dismantled through a court-authorized operation on September 18, 2024. This operation successfully thwarted cyber threats posed by PRC-backed hackers who used this botnet to conduct malicious activities, posing a serious risk to global cybersecurity.

Court-Authorized Operation to Disrupt a Global Botnet:
The botnet was developed and operated by Integrity Technology Group, a Beijing-based company known in cybersecurity circles as “Flax Typhoon.” The infected devices, which included routers, IP cameras, and digital video recorders (DVRs), were exploited to conduct coordinated malicious activities under the guise of routine internet traffic. The FBI, working in coordination with international partners, managed to gain control over the hackers’ infrastructure, sending disabling commands to the infected devices. The action rendered the botnet inactive without impacting the legitimate functionalities of the compromised devices.

The significance of this operation lies in its scale, with more than 200,000 consumer devices in the United States and globally affected. While the hackers attempted a Distributed Denial-of-Service (DDoS) attack to disrupt the FBI’s operation, the agency successfully disabled the malware and restored the devices to normal function.

Chinese State-Sponsored Hackers Behind the Attack:
According to court documents, Integrity Technology Group, a publicly traded company in China, operated this botnet for malicious purposes under the PRC government’s directive. Using an online tool called “KRLab,” the company allowed users to control infected devices remotely through a dashboard, which offered a variety of malicious cyber commands. The FBI and Microsoft’s threat intelligence group have tracked Integrity Technology Group’s activities back to “Flax Typhoon,” a hacker group operating since 2021.

Flax Typhoon has reportedly targeted government agencies, educational institutions, and key infrastructure sectors worldwide, including in Taiwan and the United States. Their activities have included stealing sensitive data and launching disruptive cyberattacks.

Global Collaboration and International Partners:
This takedown was made possible through the cooperation of international partners, including cybersecurity experts from Australia, Canada, New Zealand, the United Kingdom, and France. U.S. Cyber Command’s Cyber National Mission Force also played a critical role in the operation. Private sector collaboration, particularly from Lumen Technologies’ Black Lotus Labs, first identified the botnet, named “Raptor Train,” in July 2023.

This collaborative global effort underscores the importance of coordinated responses to address the growing threat posed by state-sponsored hackers who target international networks, governments, and critical infrastructure.

10 Best Practices to Avoid Botnet Infections:

  1. Update Firmware Regularly: Ensure that routers, IP cameras, and other IoT devices are updated with the latest firmware to fix security vulnerabilities.
  2. Change Default Credentials: Replace default passwords and usernames on devices with complex, unique credentials to prevent easy access by hackers.
  3. Use Strong Passwords and Multi-Factor Authentication (MFA): Employ MFA and strong passwords for both personal and business accounts to limit unauthorized access.
  4. Secure Networks: Use a virtual private network (VPN) and firewall settings to shield devices from external threats and limit open ports to prevent unauthorized access.
  5. Monitor Network Activity: Regularly check your network traffic for any unusual activity or spikes that could indicate a botnet or malware infection.
  6. Disable Unused Services: Turn off any unnecessary features on your devices, such as remote management or file-sharing services, to minimize entry points for hackers.
  7. Segment Your Network: Separate critical systems, such as work computers or financial systems, from IoT devices and other non-critical devices on different networks.
  8. Deploy Endpoint Detection and Response (EDR): Use EDR solutions to detect suspicious activity on devices, especially those that may connect to IoT networks.
  9. Educate Users: Regularly train employees and family members about cybersecurity threats like phishing, which hackers use to gain access to devices.
  10. Back Up Data: Ensure regular backups of critical data in case of an attack, and keep the backups offline to prevent them from being targeted by malware.

Conclusion:
The successful dismantling of a global botnet run by PRC state-sponsored hackers marks a significant milestone in the fight against cyber threats. The operation highlights the growing sophistication of botnet networks, their potential for global damage, and the importance of coordinated, international responses. As botnet operations become more prevalent, individuals and organizations must remain vigilant, adopt robust cybersecurity measures, and stay informed to avoid becoming part of a malicious network.

Want to stay on top of cybersecurity news? Follow us on Facebook – X (Twitter) – Instagram – LinkedIn – for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here