Cyber security news for all

More

    U.S. Government Dismantles China-Linked “KV-Botnet” Targeting SOHO Routers

    The U.S. government recently announced significant measures to dismantle a nefarious botnet, known as the KV-botnet, which had been targeting hundreds of small office and home office (SOHO) routers across the United States. This botnet, orchestrated by a China-associated threat group named Volt Typhoon, posed a severe threat to cybersecurity, particularly to critical infrastructure sectors.

    The discovery of the KV-botnet was initially made public by the Black Lotus Labs team at Lumen Technologies in December 2023. Shortly after, law enforcement agencies, as reported by Reuters, took action to neutralize this cyber threat.

    The Department of Justice (DoJ) revealed that the majority of routers comprising the KV-botnet were Cisco and NetGear routers that had reached their ‘end of life’ status. This meant they were no longer receiving security updates from the manufacturers, making them vulnerable to exploitation.

    Volt Typhoon, also known by various aliases such as DEV-0391, Bronze Silhouette, Insidious Taurus, or Vanguard Panda, is a China-based threat group known for its cyber attacks on critical infrastructure sectors in the U.S. and Guam.

    Volt Typhoon employs sophisticated techniques, including the use of legitimate tools and living-off-the-land (LotL) strategies to remain undetected within victim networks. They also leverage compromised SOHO network equipment, such as routers and firewalls, to mask their activities.

    The KV-botnet serves as a covert data transfer network, commandeering devices from various manufacturers to facilitate advanced persistent threats. It is suspected that Volt Typhoon offers these services to other hacking groups.

    Reports from cybersecurity firm SecurityScorecard indicated that the KV-botnet compromised a significant number of end-of-life Cisco routers within a short period, underscoring its potency as a cyber weapon.

    The U.S. Federal Bureau of Investigation (FBI) initiated a court-authorized operation to disrupt the botnet. This involved remotely issuing commands to infected routers to delete the KV-botnet payload and prevent re-infection.

    While the operation successfully removed the malware from the routers, it’s essential to note that the prevention measures are temporary and would require sustained efforts to prevent re-infection.

    Despite accusations, the Chinese government denied any involvement in the attacks, labeling them as a “disinformation campaign.” However, the FBI Director Christopher Wray emphasized the seriousness of the threat posed by Volt Typhoon’s activities.

    In response to the growing threat landscape, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued guidance urging SOHO device manufacturers to prioritize security during product development.

    The takedown of the KV-botnet underscores the importance of international cooperation in combating cyber threats. It also highlights the need for enhanced cybersecurity measures, particularly in protecting critical infrastructure from sophisticated adversaries like Volt Typhoon.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]