It was only in May of 2023 that Microsoft discovered that the Volt Typhoon was stealing data from critical infrastructure organizations in Guam, which it linked to the Chinese government. This knowledge came as a result of a spy observing the threat actor stealing data from critical infrastructure organizations on US territory.
A report by Lumen Technologies’ Black Lotus Labs released in December 2023 revealed that outdated devices mostly powered Volt Typhoon’s botnet from Cisco, Netgear, and Fortinet.
The US government recently announced that the Volt Typhoon botnet had been neutralized and would cease to operate. Leveraging the botnet’s C&C mechanisms, the FBI remotely removed the malware from the routers and changed the router’s IP address to a port that is not accessible to the botnet.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: