The Department of Justice has a botnet of hundreds of small office and home office routers hijacked by hackers sponsored by the People鈥檚 Republic of China in a campaign targeting U.S. critical infrastructure and other organizations. Most of the infected routers were Cisco and NetGear routers that were no longer supported through the manufacturer鈥檚 security patches or other software updates. The DOJ鈥檚 court-authorized operation deleted the 鈥淜V Botnet鈥 malware from the routers and took additional steps to sever their connection to the botnet, such as blocking communications with other devices used to control the botnet.

鈥淐hina鈥檚 hackers are targeting American civilian critical infrastructure, pre-positioning to cause real-world harm to American citizens and communities in the event of conflict,鈥 said FBI Director Christopher Wray. 鈥淰olt Typhoon malware enabled China to hide as they targeted our communications, energy, transportation, and water sectors. Their pre-positioning constitutes a potential real-world threat to our physical safety that the FBI is not going to tolerate. We are going to continue to work with our partners to hit the PRC hard and early whenever we see them threaten Americans.鈥

In other , the department charged a Belarusian and Cypriot national with operating an unlicensed digital currency exchange that allegedly received criminal proceeds from numerous computer intrusions and hacking incidents, including ransomware scams.  

鈥淭hese significant and commendable FBI enforcement actions deal a blow to the dual-natured cyberthreats we are facing as a field,鈥 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淔irst, in terms of nation-state threats, the FBI鈥檚 identification and pre-emptive removal of the Volt Typhoon destructive malware is proof positive that Chinese government cyber efforts are no longer solely focused on espionage and data theft. They clearly intend to be in a position to inflict physical harm to our critical infrastructure, impacting the safety of hospitals and all Americans. Given the current and future strategic threat environment, it would be prudent for hospitals and health systems to closely coordinate emergency management and cyber incident response planning to include contingency planning for disruption to utilities and communications. Second, the enforcement action against the unlicensed digital currency exchanger is also significant as it has disrupted a channel for laundering of cybercrime proceeds. Digital currency is fuel for all cybercrime and illegal digital currency exchangers are the filling stations for cybercriminals. Shutting them down is key to reducing the global cyberthreat we all face.鈥 

For more information on this or other cyber and risk issues, contact Riggi at鈥jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre June 4 released an advisory on updated actions and tactics used鈥
Headline
The National Security Agency, Cybersecurity and Infrastructure Security Agency and international partners May 22 released guidance on securing data used for鈥
Headline
The FBI, along with the National Security Agency and other international cybersecurity agencies, this week released a joint agency advisory on cyber operations鈥
Headline
The FBI's Internet Crime Complaint Center released an alert May 7 warning of cyber actors exploiting vulnerabilities in end-of-life routers. Routers dated 2010鈥
Headline
The FBI鈥檚 Internet Criminal Complaint Center May 15 released an alert warning of a malicious text and voice messaging campaign involving impersonators鈥
Headline
In his latest AHA Cyber Intel blog, John Riggi, AHA national advisor for cybersecurity and risk, examines the state of cyber and physical threats in 2025 as鈥