Raptor Train

Threat Actor updated 3 months ago (2024-11-29T13:57:34.682Z)
Download STIX
Preview STIX
Raptor Train, a Chinese state-sponsored botnet, has emerged as a significant threat actor in the cybersecurity landscape. Since its inception in May 2020, it has compromised over 200,000 devices worldwide, including Small Office/Home Office (SOHO) routers, Network Video Recorder/Digital Video Recorder (NVR/DVR) devices, Network Attached Storage (NAS) servers, and IP cameras. By June 2023, at the height of its activity, Raptor Train had infiltrated more than 60,000 additional devices, bringing the total number of compromised devices to over 260,000. This vast network of infected IoT and office network devices has been used to target critical infrastructure on a global scale, making Raptor Train one of the largest China-linked IoT botnets ever discovered. The discovery of Raptor Train was made by Lumen's Black Lotus Labs through their monitoring of malicious activity in mid-2023. Their in-depth investigation into the botnet's infrastructure revealed that Raptor Train operates using a multitiered approach. Tier 1 devices consist of consumer-grade hardware, while Tier 2 and Tier 3 nodes are dedicated servers that manage payload distribution, exploit management, and botnet command execution. Observations indicate that the operators, likely based in China, manage Tier 2 nodes via Secure Shell connections during Chinese working hours. Despite the absence of any confirmed distributed denial-of-service (DDoS) attacks from Raptor Train to date, Black Lotus Labs warns that the botnet is potentially capable of scaling such attacks and exploiting vulnerabilities across a large number of devices. This capability suggests that Raptor Train could be a formidable tool for disruptive operations in the future. Therefore, ongoing vigilance and robust cybersecurity measures are crucial to mitigate this threat.
Description last updated: 2024-10-17T12:24:58.569Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Botnet
State Sponso...
Ddos
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Raptor Train Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more