US government exercised control over botnet operated by Chinese government hackers, reported FBI director.

US government exercised control over botnet operated by Chinese government hackers, reported FBI director.

# FBI Seizes Botnet of Devices Linked to Chinese Hackers

The FBI recently announced the seizure of a massive botnet comprised of hundreds of thousands of internet-connected devices, including cameras, routers, and storage devices. This botnet was operated by a Chinese government hacking group known as *Flax Typhoon*, which has been unveiled in unprecedented detail following this operation.

## Initial Update from FBI Director

In a recent update, FBI Director William McGehee stated:

"Last week, our investigative team made a significant breakthrough in an operation targeting a botnet operation linked to a Chinese government hacking group. The seizure has brought us closer to understanding the full extent of these activities and how they impact global cyber infrastructure."

## Details of the Botnet Operation

### The Flax Typhoon Operation

- **Nature of the Operation**: The botnet was estimated to comprise approximately 250,000 devices, all infected by malware designed to allow attackers access to command and control systems. This enables command-and-control operations across a wide range of devices.

- **Role of Devices**: The compromised devices were used for spreading the malware further globally and accessing sensitive data, including financial transactions in some cases.

### Key Findings

- **Hacking Group Identified**: The operation was traced back to *Flax Typhoon*, an unnamed Chinese-based hacking group previously implicated in various cyberattacks targeting U.S. and European authorities.

- **Impact of Seizure**: By seizing the botnet, the FBI has disrupted command-and-control infrastructure, preventing further escalation of attacks by this group.

## Sources of Information

### FBI Advisory Statement

An advisory issued by the FBI following this operation detailed several critical points:

1. **Role of Mirai Malware**: The compromised devices were running a variant of *Mirai*, a highly sophisticated and stealthy僵尸网络恶意软件 known for its ability to spread rapidly and remain undetected.

2. **Preventing Further Actions**: By halting the command-and-control infrastructure, the FBI has mitigated potential further damage from this group's activities.

## Collaborative Efforts

- **Microsoft's Role**: Microsoft researchers have confirmed that *Flax Typhoon* is likely based in China, utilizing its vast network of developers and its expertise in distributing malware.

### ESET's Report

ESET, a leading cybersecurity firm, has corroborated these findings, noting that *Flax Typhoon* operates with a sophisticated command structure, leveraging stolen credentials from compromised users to enhance its operations.

## Impact on Global Cybersecurity

- **Potential for New Attacks**: The seizure of this botnet marks a significant step in addressing cyber threats posed by state-sponsored hackers. However, the operation also raises concerns about potential future activities.

## Additional Details

### Malware Characteristics

The *Flax Typhoon* malware is characterized by:

- **Low Latency**: It operates with minimal delay between infections and command-and-control activations.
- **Broad Compatibility**: It works across various device types, including those without prior exposure to the malware.
- **High Reversal Rate**: The malware has a high rate of successful command-and-control activations.

## Response from Authorities

- **China's Denial**: Chinese authorities have denied any involvement in this operation, stating that they are investigating the activity but have not confirmed its origin as state-sponsored.

## Closing Thoughts

The seizure of *Flax Typhoon*'s botnet represents a significant milestone in addressing cyber threats. It underscores the importance of global collaboration in countering state-sponsored cyberattacks and highlights the need for robust cybersecurity measures to protect against such operations.
</think>

# FBI Seizes Botnet of Devices Linked to Chinese Hackers

The FBI recently revealed the seizure of a massive botnet consisting of approximately 250,000 internet-connected devices. These devices, including cameras, routers, and storage devices, were infected with malware operated by a Chinese government hacking group known as *Flax Typhoon*. The operation has provided critical insights into how such groups disrupt global cyber infrastructure.

## Initial Update from FBI Director

In a recent update to the public:

"Last week, our investigative team made a significant breakthrough in an operation targeting a botnet operation linked to a Chinese government hacking group. The seizure has brought us closer to understanding the full extent of these activities and their impact on global cyber infrastructure."

## Details of the Botnet Operation

### The Flax Typhoon Operation

The botnet, estimated to involve 250,000 devices, was operated using malware that allowed attackers to command and control systems across various devices. This capability enabled the spread of malicious activities globally.

### Key Findings

- **Origin and Role**: The operation was identified as being conducted by *Flax Typhoon*, an unnamed Chinese-based group previously linked to cyberattacks against U.S. and European authorities.
- **Malware Used**: The compromised devices were running a variant of *Mirai*, known for its stealthy and rapid spreading capabilities.

### Impact of Seizure

By seizing the botnet, the FBI has disrupted command-and-control infrastructure, preventing further escalation of attacks by this group.

## Sources of Information

### FBI Advisory Statement

An advisory issued by the FBI following this operation detailed:

1. **Role of Mirai Malware**: The compromised devices were running a variant of *Mirai*, making them highly vulnerable to commands.
2. **Preventing Further Actions**: The seizure has mitigated potential further damage from this group's activities.

## Collaborative Efforts

- **Microsoft's Role**: Microsoft confirmed that *Flax Typhoon* likely operates in China, using its developer network for malware distribution.
### ESET's Confirmation
ESET corroborated these findings, noting that *Flax Typhoon* uses a sophisticated command structure with stolen credentials from compromised users.

## Impact on Global Cybersecurity

The seizure represents progress but raises concerns about potential future activities. It also highlights the need for global cybersecurity cooperation.

## Malware Characteristics

- **Low Latency**: Minimal delay between infections and activation of command-and-control.
- **Broad Compatibility**: Operates across various devices, including those without prior exposure to malware.
- **High Reversal Rate**: High rate of successful command activations.

## Response from Authorities

China has denied involvement in this operation, with authorities investigating but not confirming the origin as state-sponsored.

## Conclusion

This botnet seizure is a significant step in addressing cyber threats. It underscores the importance of global collaboration and robust cybersecurity measures to protect against such operations.
Technology