Chinese botnet containing hundreds of end-of-life Cisco and Netgear routers disrupted by US government

The US government has successfully disrupted a botnet created by a Chinese hacking group known as Volt Typhoon. The botnet was responsible for cyber attacks on critical national infrastructure (CNI) organizations in the US and other countries.

According to a security alert from the US Office of Public Affairs, Volt Typhoon had hijacked hundreds of small-office/home office routers from Cisco and Netgear brands across America. These routers were infected with the KV Botnet malware, which allowed the hackers to disguise themselves as the source of subsequent attacks on CNI organizations in the US and overseas.

In May 2025, the UK National Cyber Security Centre (NCSC) and other international intelligence agencies issued guidance to CNI operators, urging them to take preventive measures against Volt Typhoon’s attempts to access and hide on their systems.

The botnet takedown was authorized by a US court in December 2023. It involved removing the malware from the affected routers and taking additional steps to block other devices from communicating with the botnet. FBI Director Christopher Wray stated that Volt Typhoon’s actions posed a threat to sectors such as communications, energy, transportation, and water, and emphasized the FBI’s commitment to combating such threats. Attorney General Merrick Garland also highlighted the Justice Department’s proactive approach to protecting the nation’s CNI.

Deputy Attorney General Lisa Monaco emphasized the Department of Justice’s use of various tools to disrupt national security threats in real-time. She also underscored the importance of partnership with the private sector, as victim reporting is crucial in fighting cyber crime.

Sandra Joyce, Vice-President of Intelligence at Mandiant, a cyber threat intelligence company owned by Google, explained that Volt Typhoon’s methods make it challenging to detect their activity. They use compromised systems to blend in with normal network activity and continuously change the source of their activity. Despite the difficulties, Joyce believes tracking and identifying their actions is not impossible.

Unlock your business potential with our expert guidance. Get in touch now!

charts-graphs-data-2-Kittiphat-adobe.jpg

NasuniIQ Introduces Visual Representation for Handling Large Unstructured Datasets

tr-todoist-alternatives.jpg

Top 7 Todoist Alternatives & Competitors to Consider in 2024

searchEnterpriseAI_055.png

Birmingham City Council Seeks an Additional £45m to Address Critical Issues with Oracle System

tr_20240216-microsoft-powershell-certification-automation.jpg

Discover 6 PowerShell Courses That Teach Automating Admin Tasks at $20

music-drum-guitar-microphone-adobe.jpeg

Switch to Pure results in music agency cutting space and energy costs by half

tr_20240216-square-vs-onpay.jpg

A Comparison of Payroll Software: Square Payroll vs OnPay for 2024

Women-business-diversity-1-adobe.jpg

Tech Diversity Hindered by Misunderstandings and Underrepresentation