Raptor Train: Chinese Nation-State Botnet Compromises Over 200,000 Devices

Black Lotus Labs released a report detailing the discovery of a botnet, dubbed "Raptor Train." This multi-tiered network has compromised more than 200,000 small office/home office (SOHO) routers, Internet of Things (IoT) devices, and network infrastructure worldwide.

Raptor Train: Chinese Nation-State Botnet Compromises Over 200,000 Devices
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

Introduction

On September 18, 2024, Black Lotus Labs released a comprehensive report detailing the discovery of a sophisticated botnet, dubbed "Raptor Train." This multi-tiered network has compromised more than 200,000 small office/home office (SOHO) routers, Internet of Things (IoT) devices, and network infrastructure worldwide. The botnet is attributed to the Chinese threat actor group, Flax Typhoon. Initial investigations began in mid-2023, revealing a massive state-sponsored operation targeting U.S. and Taiwanese entities in sectors such as military, government, and telecommunications.

Report Overview

Raptor Train has been operational for over four years, with its origins traced back to May 2020. It is managed by Flax Typhoon, a nation-state group allegedly supported by China. The botnet leverages vulnerabilities in SOHO and IoT devices, including modems, routers, IP cameras, and network-attached storage (NAS) servers. The operation went undetected for years, evolving into one of the largest IoT-based botnets ever uncovered.

The botnet is managed through a sophisticated network of compromised devices divided into three tiers:

  1. Tier 1: Consists of infected SOHO and IoT devices such as routers and cameras.
  2. Tier 2: Exploitation and payload servers deliver malware to Tier 1 devices.
  3. Tier 3: Command and Control (C2) management nodes handle the botnet's operations through a custom-built platform called "Sparrow."

The primary malware used in this botnet, called "Nosedive," is a modified version of the infamous Mirai malware. Nosedive is memory-resident, making detection and forensics difficult. This malware variant enables the operators to run commands, exfiltrate data, and launch Distributed Denial of Service (DDoS) attacks, although no DDoS incidents have been observed thus far.

The botnet’s scale is alarming, with over 200,000 devices actively compromised as of mid-2023. These devices include consumer-grade modems, routers, and NAS servers, as well as critical infrastructure components such as IP cameras. The network has primarily targeted U.S. and Taiwanese organizations, focusing on critical sectors like defense, government, and telecommunications.

The compromised devices are used not only for gathering intelligence but also for further exploitation attempts, including scanning for vulnerable Atlassian Confluence servers and Ivanti Connect Secure appliances. The botnet's ability to scale up quickly, rotating thousands of devices every 17 days, poses a significant threat to global digital infrastructure.

Insights and Analysis

While Black Lotus Labs has not yet seen any DDoS attacks launched from the botnet, they suspect that this capability is being preserved for future use. The scale and sophistication of the operation, along with the sectors targeted, suggest a long-term strategic campaign aimed at weakening critical infrastructure. The botnet’s management through the Sparrow application demonstrates an enterprise-level approach to botnet control, allowing operators to exploit vulnerabilities on a massive scale with minimal manual intervention.

Conclusion and Preventative Measures

The Raptor Train botnet presents a significant risk to global security. Organizations in affected sectors should take immediate action to secure their infrastructure. Key recommendations include:

  • Implementing secure access service edge (SASE) or similar solutions to detect and block unauthorized network-based communications.
  • Regularly rebooting routers and installing the latest security patches.
  • Monitoring for large, unusual data transfers, especially from SOHO devices, as these may indicate exfiltration or botnet activity.

Consumers and network operators alike should be mindful of devices nearing end-of-life, as they are particularly vulnerable to exploitation. Black Lotus Labs continues to monitor and disrupt the activities of Raptor Train to mitigate its impact on critical infrastructure.

Indicators of Compromise (IOC)

IndicatorTypeDescription
No specific Indicators of Compromise (IOCs) were provided in the source material.

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Command and ControlEncrypted ChannelT1573Use of TLS encryption on port 443 for communication between botnet nodes.
Command and ControlApplication Layer ProtocolT1071Use of HTTPS communication for C2 traffic between Tier 1 and Tier 2 nodes.
ExecutionCommand-Line InterfaceT1059Execution of commands on compromised devices, including DDoS and file uploads/downloads.
PersistenceImplant via Software Supply ChainT1195Deployment of the custom Mirai-based "Nosedive" malware to compromised IoT devices.
Not AvailableNot AvailableNot AvailableNo further specific MITRE ATT&CK TTPs were provided in the source material.

References

https://blog.lumen.com/derailing-the-raptor-train/

https://assets.lumen.com/is/content/Lumen/raptor-train-handbook-copy?Creativeid=17b819e2-06d1-4f29-a43f-a4e01b4a4fba