Loading...
Loading...
Browse all stories on DeepNewz
VisitWhat was the primary method used by 'Flax Typhoon' to compromise devices?
Phishing • 25%
Malware • 25%
Exploiting vulnerabilities • 25%
Other • 25%
Official reports from cybersecurity firms or government agencies
FBI Disrupts Chinese Botnet 'Flax Typhoon' with 260,000 Devices
Sep 18, 2024, 04:35 PM
The FBI has disrupted a second major Chinese hacking group known as 'Flax Typhoon,' according to FBI Director Christopher Wray. This group, which posed as an IT firm, was running a botnet comprising 260,000 Internet of Things (IoT) devices. The operation was a joint effort involving multiple U.S. government agencies, including the NSA. The botnet targeted critical infrastructure in the U.S. and abroad, compromising hundreds of thousands of devices. The FBI's action has wrested thousands of compromised devices from the control of Flax Typhoon. The announcement was made at the Aspen Cyber Summit.
View original story
Phishing • 25%
Zero-day exploits • 25%
Malware • 25%
Other • 25%
Phishing • 25%
Malware • 25%
DDoS • 25%
Exploiting Vulnerabilities • 25%
Phishing • 25%
Malware • 25%
DDoS Attacks • 25%
Other • 25%
Phishing attacks • 25%
Malware installation • 25%
Impersonation tactics • 25%
Other • 25%
Phishing attacks • 25%
Zero-day vulnerabilities • 25%
Insider threats • 25%
Supply chain attacks • 25%
Router vulnerabilities • 25%
Camera vulnerabilities • 25%
Other internet-connected devices • 25%
Unknown/Multiple methods • 25%
Software patches and updates • 25%
Physical replacement of devices • 25%
International law enforcement action • 25%
Other • 25%
Routers • 25%
Cameras • 25%
Firewalls • 25%
Other IoT Devices • 25%
Phishing • 25%
Exploiting software vulnerability • 25%
Insider threat • 25%
Other • 25%
Financial Sector • 25%
Healthcare Sector • 25%
Energy Sector • 25%
Other • 25%
Phishing attack • 25%
Malware • 25%
Exploited vulnerability • 25%
Insider threat • 25%
Phishing • 25%
Ransomware • 25%
DDoS • 25%
Other • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
Russian hacking group • 25%
Other • 25%
Chinese hacking group • 25%
North Korean hacking group • 25%