The U.S. government on Wednesday announced that it had neutralized a massive botnet of hardware devices controlled by Russia’s main intelligence agency (GRU).
In the court-approved operation, the Federal Bureau of Investigation (FBI) partnered with Watchguard to copy and remove the “Cyclops Blink” malware that serves as the hub for a large-scale botnet targeting firewall appliances and SOHO networking devices.
Cyclops Blink, which maintains persistence throughout the legitimate device firmware update process, has been directly linked to APT groups associated with the Russian government.
In a statement Wednesday, the U.S. Justice Department said the operation was conducted last month “to disrupt a two-tiered global botnet of thousands of infected network hardware devices under the control of a threat actor known to security researchers as Sandworm.”
[ READ: U.S. Gov Warning: Firmware Security a ‘Single Point of Failure‘ ]
The agency said the operation copied and removed malware from vulnerable internet-connected firewall devices that Sandworm used for command and control (C2) of the underlying botnet.
Although the operation did not involve access to the Sandworm malware on the thousands of underlying infected devices worldwide, the Justice Department said the disabling of the C2 mechanism severed those bots from the Sandworm C2 devices’ control.
WatchGuard Technologies, which makes devices that were targeted by the malware, has released detection and remediation tools alongside recommendations for device owners to remove any malware infection and patch their devices to the latest versions of available firmware.
Device maker ASUS also released its own guidance to help compromised ASUS device owners mitigate the Cyclops Blink malware threat.
The Justice Department said the operation led to the successful remediation of thousands of compromised devices but warned that a majority of the originally compromised devices remained infected.
Related: Russia-Linked Cyclops Blink Botnet Attacking ASUS Routers
Related: New Modem Wiper Malware May be Connected to Viasat Hack
Related: U.S. Gov Issues Warning, Calling Firmware Security a ‘Single Point of Failure’
Related: Hundreds of Networks Still Host Devices Infected With VPNFilter Malware

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure
- Researchers Spot APTs Targeting Small Business MSPs
- Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own
- Red Hat Pushes New Tools to Secure Software Supply Chain
- Investors Make $6M Bet on Manifest for SBOM Management Technology
- Entro Raises $6M to Tackle Secrets Sprawl
- IBM Snaps up DSPM Startup Polar Security
- Huntress Closes $60M Series C for MDR Expansion
Latest News
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Amazon Settles Ring Customer Spying Complaint
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
