Thu Sep 19 07:27:35 UTC 2024: ## FBI Disrupts China-Linked Botnet Targeting US Infrastructure

**Washington, D.C.** – The FBI has successfully disrupted a botnet campaign, dubbed Flax Typhoon, orchestrated by Chinese-backed hackers. This campaign targeted American infrastructure and various internet-connected devices, according to FBI Director Christopher Wray.

Wray, speaking at a cyber summit on Wednesday, stated that Flax Typhoon hijacked hundreds of thousands of IoT devices, including cameras, video recorders, and storage devices, primarily within the U.S. and other countries. These devices were used to infiltrate corporate networks, media organizations, universities, and government agencies, potentially allowing the hackers to steal sensitive data.

The hackers, operating under the guise of a fake information security company named Integrity Technology Group, attempted to build on the tactics of Volt Typhoon, another China-linked hacking group identified by Microsoft last year. Volt Typhoon, aimed at disrupting communication infrastructure in Guam, utilized office network equipment like routers and firewalls.

The FBI, working with international partners and under court authorization, seized control of Flax Typhoon last week. This forced the hackers to abandon their botnet and attempt to switch to a backup system, which was also disrupted by the FBI.

China’s embassy in Washington vehemently denied the accusations, claiming the U.S. is the primary perpetrator of cyberattacks and lacks credible evidence.

Following the announcement, the NSA issued an advisory encouraging anyone with a compromised device to install necessary patches. The Flax Typhoon botnet was reportedly operating in North America, Europe, Africa, and Southeast Asia, with nearly half of the compromised devices located in the U.S.

This latest incident highlights the ongoing threat posed by Chinese-backed hackers to global infrastructure and underscores the importance of robust cybersecurity measures. The FBI and other agencies are working to counter these threats and protect critical systems from malicious actors.

Read More