Flax Typhoon (also known as UNC5007, Red Juliet, Ethereal Panda, and Storm-0919) first emerged in 2021. The group had flown under the radar due to its primary focus on Taiwanese targets, with additional victims in Hong Kong and parts of Africa. Believed to operate primarily for cyber espionage, Flax Typhoon targeted sectors such as education, IT, and critical infrastructure. According to Microsoft, the group prioritizes stealth by minimizing the use of malware and relying on legitimate software, thereby emphasizing defense evasion over speed.
The now-dismantled botnet, active since 2021, consisted of 260,000 devices globally— almost half located in the US. The devices compromised included IoT gadgets, SOHO routers, firewalls, and network storage devices. Many of these devices were no longer supported by their vendors, though some still received updates. The botnet, based on the notorious Mirai malware, hijacked Linux-based IoT devices such as webcams, DVRs, IP cameras, and routers.
To build the botnet, Flax Typhoon exploited 66 known vulnerabilities, 11 of which continue to be actively scanned by malicious actors. Key vulnerabilities exploited by the group include:
Zafran’s customers are able to monitor their networks’ exposure to the risk posed by Flax Typhoon, as to spot and mitigate particularly serious vulnerabilities found in their systems. Moreover, they could alleviate their compensatory security controls in order to proactively tackle the Tactics and Techniques used by the Chinese actor.