<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Around 1.2 million IoT devices were part of a botnet worldwide.]]></title><description><![CDATA[<p dir="auto"><em>Archived from the IMDb Discussion Forums — Computers and Software</em></p>
<hr />
<p dir="auto"><strong>Wu Ming</strong> — <em>1 year ago(September 25, 2024 09:38 AM)</em></p>
<p dir="auto">Around 1.2 million IoT devices were part of a botnet worldwide.<br />
The FBI has now shut it down.<br />
Image created with AI in Bing Designer.<br />
According to the Department of Justice, US prosecutors have shut down the IoT botnet dubbed<br />
"Raptor Train"<br />
based on a court order. Michael Horka, Senior Lead Information Security Engineer at Black Lotus Labs, explained that all IP traffic to the command and control servers (C2), payload servers and the rest of the botnet infrastructure are routed via zero routing, let it run empty.<br />
The FBI took over parts of the infrastructure and instructed the bots to switch off.<br />
Black Lotus Labs is part of the IT security provider Lumen Technologies and first brought<br />
Raptor Train<br />
to the attention of prosecutors in mid-2023. Lumen Technologies described the structure of the botnet in detail.<br />
Raptor Train: Chinese-controlled Botnet<br />
<img src="https://filmglance.com/discuss/assets/plugins/nodebb-plugin-emoji/emoji/android/1f1e8-1f1f3.png?v=8570fb93240" class="not-responsive emoji emoji-android emoji--flag-cn" style="height:23px;width:auto;vertical-align:middle" title=":flag-cn:" alt="🇨🇳" />​<br />
According to the FBI, the botnet was operated by a Chinese company called Integrity Technology Group (Integrity Tech), which authorities allege has ties to the Chinese government.<br />
Companies like Microsoft and Crowdstrike refer to the state hacking force as<br />
"Flax Typhoon"<br />
.<br />
In June<br />
Integrity Tech<br />
controlled more than 260,000 routers, web cams and NAS devices around the world.<br />
Affected manufacturers include Asus, DrayTek, Hikvision, Microtik, Mobotix, Qnap, Synology, TP-Link, Ruckus Wireless and Zyxel. According to Michael Horka, who presented the<br />
Raptor Train<br />
at the Labscon 2024 security conference, no Zero-Day-Exploits were used to infect the devices. But the infrastructure is designed for this.<br />
The prosecutors list all of the vulnerabilities exploited by<br />
Raptor Train<br />
.<br />
Many of the affected devices are still provided with security updates by the manufacturers.<br />
….<br />
….<br />
<a href="https://www.heise.de/news/Heim-Router-Webcams-NAS-Geraete-Riesiges-IoT-Botnet-vom-FBI-abgeschaltet-9939939.html" rel="nofollow ugc">https://www.heise.de/news/Heim-Router-Webcams-NAS-Geraete-Riesiges-IoT-Botnet-vom-FBI-abgeschaltet-9939939.html</a><br />
September 23, 2024<br />
Edit to add<br />
Bravo, FBI! <img src="https://filmglance.com/discuss/assets/plugins/nodebb-plugin-emoji/emoji/android/2665.png?v=8570fb93240" class="not-responsive emoji emoji-android emoji--hearts" style="height:23px;width:auto;vertical-align:middle" title=":hearts:" alt="♥" /><br />
Serious meant, no irony.</p>
]]></description><link>https://filmglance.com/discuss/topic/4809/around-1-2-million-iot-devices-were-part-of-a-botnet-worldwide</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 16:14:28 GMT</lastBuildDate><atom:link href="https://filmglance.com/discuss/topic/4809.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 11 Apr 2026 04:40:13 GMT</pubDate><ttl>60</ttl></channel></rss>