CLOUDLumen Black Lotus Labs outlines Raptor Train bot network...

Lumen Black Lotus Labs outlines Raptor Train bot network impacting SOHO and IoT devices

Lumen Black Lotus Labs outlines Raptor Train bot network impacting SOHO and IoT devices
Source: Lumen Black Lotus Labs

Prior to the pandemic, remote and home networks were a relatively small concern from a risk perspective. During the pandemic, this risk skyrocketed as employees were required to rely on their home network as an extension of their corporate network.

This risk is not new. What is new is the number of compromised devices in the wild…and, increasingly, potentially putting corporate entities at risk.

Lumen’s Black Lotus Labs identified Raptor Train as one such bot network starting in 2023. Raptor Train is likely driven by nation state threat actors and has grown from over 60,000 actively compromised devices in June 2023 to now over 200,000 devices. These devices include SOHO routers, IoT devices, NVR/DVR devices, NAS servers and IP cameras.

This botnet is also suspected of launching other exploitation attempts against Atlassian Confluence servers and Ivanti Connect Secure appliances.

More information on Raptor Train: https://assets.lumen.com/is/content/Lumen/raptor-train-handbook-copy

From the CIO perspective

Risk footprint has long since been a concern for CIOs and CISOs. Reducing your footprint and potential threat vectors is key. There are a couple of steps to consider:

  1. Educate: Educate staff on ways to secure their home networks and present reasons why this is critical for them personally and professionally.
  2. Update: Ensure that devices are updated with the latest firmware and security patches.
  3. Identify: Engage your CISO’s organization to identify risk vectors, prioritize and ways to mitigate them.
  4. Communicate: Communicate up and out. Communicate with staff to educate them. Also communicate with your executive team and board to ensure that they are also up to speed on current state and ongoing efforts.
  5. Evaluate: Good security is an ongoing process. Ensure that you are tied into local, state and federal law enforcement groups along with your cybersecurity partners to ensure you have the latest intelligence.

Discover more from AVOA

Subscribe to get the latest posts sent to your email.

Latest news

TypeScript 5.7 improves error reporting

Also in TypeScript 5.7 is a new compiler option, --rewriteRelativeImportExtensions. When an import path is relative and ends with...

Cheapest Web Hosting in India | 24/7 Support

It’s critical to choose the best hosting option in the always-changing web hosting market to guarantee a seamless online...

3D Printing and AI: Revolutionizing Dentistry

The field of dentistry is undergoing a radical transformation, and much of this change is being driven by the...

The best free SEO analysis

As you continue to go on a long journey with SEO, you should do regular audits and see your...

Is generative AI disruptive or enabling?

One of the hottest topics right now is generative AI. Many may have already experimented with ChatGPT, which is...

NFS vs CIFS: Key Differences Between File Systems Explained

In the world of network file sharing, two prominent protocols stand out: NFS (Network File System) and CIFS (Common...

Must read

Top 10 CIO Trends for 2019

As we get ready to close out 2018 and...

Are the cloud wars over or just getting started?

One of the biggest opportunities for enterprises large and...

You might also likeRELATED
Recommended to you