Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Tiktok now allows users to send voice memos and images via DMS

August 29, 2025

California Uber and Lyft drivers win the path to unionization

August 29, 2025

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Tiktok now allows users to send voice memos and images via DMS

    August 29, 2025

    California Uber and Lyft drivers win the path to unionization

    August 29, 2025

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

    August 29, 2025

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    A sign of “t”? It's a lot of dollars, nvidia

    August 29, 2025

    A comprehensive list of 2025 tech layoffs

    August 29, 2025

    Apply to host a side event that hinders you in 2025

    August 29, 2025

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025
TechBrunchTechBrunch

FBI director says US government has 'gained control' of botnet run by Chinese government hackers

TechBrunchBy TechBrunchSeptember 18, 20243 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Last week, the FBI seized control of a botnet consisting of hundreds of thousands of internet-connected devices, including cameras, video recorders, storage devices and routers, that was run by a Chinese government hacking group, FBI Director Christopher Wray and US government agencies revealed on Wednesday.

The hacker group, named Flux Typhoon, “targeted critical infrastructure across the U.S. and abroad, from businesses and media organizations to universities and government agencies,” Wray said at the Aspen Cyber ​​Summit, a cybersecurity conference, on Wednesday.

“But working with our partners, we conducted a court-authorized operation and seized the botnet's infrastructure,” Wray said, explaining that once the agency did so, the FBI also removed the malware from the compromised devices. “The bad guys realized what was going on and attempted to migrate the bots to new servers, which is where we started.” [Distributed Denial of Service] It's an attack on us.”

When contacted by TechCrunch on Wednesday, an FBI spokesperson declined to comment.

It is the latest U.S.-led effort against infrastructure linked to Chinese-backed hacking operations and cyberattacks as senior U.S. officials warn of Chinese efforts to inflict “real-world harm” on Americans in the event of a future conflict with China.

Contact Us Have more information about nation-state cyber attacks? You can securely contact Lorenzo Franceschi-Bicchierai from a non-work device via Signal (+1 917 257 1382), Telegram, Keybase @lorenzofb, or email. You can also contact TechCrunch via SecureDrop.

In a joint advisory released Wednesday, the FBI, the Cyber ​​National Mission Force and the National Security Agency said the botnet that compromised 260,000 devices was linked to the Chinese government. The advisory said the botnet was used to conceal the activities of Chinese hackers. The U.S. government said the botnet was operated and controlled by Integrity Technology Group, which is said to work for the Chinese government.

Representatives for Integrity Technology Group did not respond to TechCrunch's request for comment on Wednesday.

According to the advisory, the botnet hacked vulnerable internet-connected devices using Mirai, a notorious piece of malware designed to control large numbers of compromised devices that was open-sourced in 2016 after a group of hackers used it to launch what was then the most powerful distributed denial-of-service attack.

Operation Flax Typhoon targeted a large number of internet-connected consumer devices, and authorities said they found a database of “more than 1.2 million compromised device records, including more than 385,000 victim devices in the United States that have been or are currently being exploited.”

A table showing the number of IoT devices compromised by Flax Typhoon. (Image: Screenshot/US Government)

Microsoft released a report on Flax Typhoon earlier this year, stating that the group had targeted “dozens of organizations” in Taiwan. The tech giant reported that Flax Typhoon has been active since mid-2021, targeting “government agencies, education, critical manufacturing, and information technology organizations in Taiwan.”

Cybersecurity firm ESET wrote in a report published Wednesday that it observed Flax Typhoon compromise multiple Microsoft Exchange servers in Taiwan and “targeted multiple government agencies as well as consulting firms, travel booking software companies, and the pharmaceutical and electronics industries.”

Earlier this year, the U.S. government thwarted the activities of another Chinese government hacker group called Bolt Typhoon, which was actively targeting U.S. internet providers and U.S. critical infrastructure. The U.S. government said at the time that Bolt Typhoon was preparing to launch cyberattacks capable of causing devastating cyberattacks in the event of a future conflict with the United States, such as an expected Chinese invasion of Taiwan.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Tiktok now allows users to send voice memos and images via DMS

August 29, 2025

California Uber and Lyft drivers win the path to unionization

August 29, 2025

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.