Wednesday, January 22, 2025
HomeBotnetResearchers Detailed Raptor Train Botnet That 60,000+ Compromised Devices

Researchers Detailed Raptor Train Botnet That 60,000+ Compromised Devices

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a large, Chinese state-sponsored IoT botnet, “Raptor Train,” that compromised over 200,000 SOHO and IoT devices.

Operated by Flax Typhoon, the botnet leveraged a sophisticated control system, “Sparrow,” to manage its extensive network. 

The botnet posed a significant threat to various sectors, including military, government, and IT, with the potential for DDoS attacks and targeted exploitation of specific vulnerabilities.

Raptor Train botnet is a three-tiered network controlled by “Sparrow” management nodes.

Meet the CISOs, Join the Virtual Panel to Learn compliance – Join for free

Compromised SOHO/IoT devices in Tier 1 are infected with the custom Mirai variant “Nosedive” through exploitation servers and payload servers in Tier 2. 

Overview of the Raptor Train network architecture and tiering structure. 

The C2 servers in Tier 2 coordinate bot activities, while Tier 3 management nodes oversee the entire operation.

To evade detection, Nosedive implants are memory-resident only and employ anti-forensics techniques, making it difficult to identify and investigate compromised devices.

Attackers are exploiting a vast range of compromised SOHO and IoT devices, including routers, cameras, and NAS devices, to form a massive botnet known as Tier 1, which is often vulnerable to both known and unknown vulnerabilities and acts as nodes in the botnet, constantly checking in with central command and control (C2) servers. 

Due to the sheer number of vulnerable devices online, the attackers can easily replace compromised devices without implementing persistent mechanisms, ensuring a continuous supply of nodes for their operations. 

an example of a TLS certificate on port 443 of a Tier 2 C2 node

Tier 2 consists of virtual servers that control compromised devices (Tier 1) and deliver malicious payloads, while its servers have two types: first-stage for general attacks and second-stage for targeted attacks with obfuscated exploits. 

Both use port 443 with a random TLS certificate for communication.

Tier 3 manages Tier 2 servers over a separate port (34125) with its own unique certificate, and the number of Tier 2 servers has grown significantly in the past four years, indicating a rise in overall malware activity. 

The Tier 3 management nodes of the botnet, known as Sparrow nodes, oversee the operations of the botnet, which facilitate manual management of Tier 2 nodes via SSH and automatic management of Tier 2 C2 nodes via TLS connections. 

Screenshot of the interactive Sparrow “Node Comprehensive Control Tool.” 

Sparrow nodes, including the NCCT and Condor, provide a comprehensive web-based interface for botnet operators to manage and control various aspects of the botnet, such as executing commands, uploading/downloading files, collecting data, and initiating DDoS attacks.

The Raptor Train botnet has been active since May 2020 and has evolved its tactics over 4 campaigns: Crossbill, Finch, Canary, and Oriole, which targets SOHO and IoT devices and uses a Mirai-based malware called Nosedive. 

It communicates with compromised devices through a tiered structure, with Tier 3 management nodes issuing commands to Tier 2 C2 servers, which then relay them to Tier 1 infected devices. 

According to Black Lotus Labs, the botnet operators are likely Chinese state-sponsored actors and have targeted critical infrastructure in the US, Taiwan, and other countries.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial  

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a...

SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL

In a recent discovery, a security researcher uncovered a critical SQL injection vulnerability on...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a...