Threat Intelligence

Flax Typhoon Residential Proxy Supply Chain 2024

Flax Typhoon's Raptor Train botnet turned consumer IoT into a state-aligned proxy network. Here is the tradecraft, the takedown, and the supply chain lessons.

Shadab Khan
Security Engineer
8 min read

Flax Typhoon is a PRC-aligned threat actor named by Microsoft in its 24 August 2023 Threat Intelligence blog. The group's 2023 operations against Taiwanese organizations were documented with a distinctive tradecraft: minimal custom implants, heavy reliance on living-off-the-land binaries, and persistent VPN access through an external-facing web shell. What elevated Flax Typhoon from a regional espionage story to a supply chain one was the September 2024 FBI-led disruption of the Raptor Train botnet — a residential-proxy network of more than 260,000 compromised SOHO routers, IP cameras, DVRs, and NAS devices that Flax Typhoon operated for operational obfuscation and targeted access.

This post covers what the Raptor Train takedown revealed about consumer IoT as a state-aligned proxy supply chain, which public documents anchor the attribution and the technical record, and what defenders — particularly those responsible for consumer IoT and for networks that allow employee-owned devices — must change.

What was the Raptor Train botnet?

The FBI and DOJ announced the takedown on 18 September 2024. An affidavit unsealed in the Eastern District of Pennsylvania (Case No. 2:24-mc-01083) laid out the details: Raptor Train was a multi-tier botnet comprising at least 260,000 devices at its 2024 peak, operated through a management framework called "Sparrow" that coordinated command and control, exit-node selection, and tasking. Affected devices included TP-Link, ASUS, DrayTek, and Zyxel SOHO routers, Hikvision and other IP cameras, and a range of network video recorders and NAS products.

Flax Typhoon's operators, according to the FBI affidavit, built Raptor Train on top of a modified Mirai variant. Infection vectors combined default-credential scanning with exploitation of known CVEs — the same vulnerabilities that CISA KEV had listed for 18 to 36 months in most cases. The botnet served two purposes: obfuscation (routing offensive traffic through residential IPs so that defenders see a "normal" ISP address rather than a PRC infrastructure IP) and targeted intrusion (using specific nodes near high-value targets for initial access operations).

Director Wray's remarks at the Aspen Cyber Summit on 18 September 2024 named Integrity Technology Group (Chinese: 北京整合科技有限公司), a PRC-based contractor, as the front operating Raptor Train, and named the individual Flax Typhoon operators associated with the contractor. This level of public attribution — a named contractor, individual names, and a takedown — is rare and significant.

Why do residential proxies matter for supply chain defenders?

Residential proxy networks are the dark-matter side of the internet's threat map. Every intrusion detection signal that depends on "known-malicious IP ranges" becomes less useful when the attacker's traffic originates from a random Verizon FIOS or Comcast customer's compromised router. CISA's AA24-241A advisory (28 August 2024) on Flax Typhoon, published jointly with NSA and FBI, explicitly called out residential-IP obfuscation as a defensive challenge.

The supply chain angle: every device in Raptor Train was consumer hardware that shipped with exploitable defaults or with CVEs that vendors disclosed but customers never patched. TP-Link SOHO routers with CVE-2023-1389, DrayTek Vigor devices with CVE-2024-12987 and the broader 2024 advisory set, and Hikvision cameras across a long tail of CVEs all appeared in the infected population. CISA's 2023-2024 KEV entries on these devices — and the corresponding vendor advisories — are the public record.

For enterprise defenders the question becomes: is your employee's home router in Raptor Train (or the next equivalent)? For vendors the question is: how does your consumer product land in a state-aligned botnet, and what is your liability under the UK PSTI Act, the EU Cyber Resilience Act, or the FTC's post-MGM enforcement posture?

What is the tradecraft inside Flax Typhoon's primary operations?

Microsoft's August 2023 blog described the primary-target tradecraft. Initial access typically exploits public-facing servers — VPN appliances, web servers, Java-based applications — using known vulnerabilities. Post-compromise, Flax Typhoon disables EDR and installs a VPN client (notably Sangfor) to establish bidirectional connectivity. Persistence relies on modifying the Sticky Keys accessibility feature (a decade-old tactic that still works because few organizations monitor it) to drop into a system shell from the login screen.

Living-off-the-land is the core of the playbook. Microsoft documented use of Windows Management Instrumentation, PowerShell, and the China Chopper web shell for routine tasks. Credential access used Mimikatz variants and, in some cases, custom token-manipulation tooling. The deliberately minimal implant footprint is what made the intrusion durable — there is little for signature-based detection to catch.

Which advisories and indictments anchor the public record?

Three public documents frame the story. Microsoft Threat Intelligence's 24 August 2023 blog is the initial attribution. The CISA/FBI/NSA/MS-ISAC joint advisory AA24-241A (28 August 2024) provides the technical indicators and hunting guidance. The FBI affidavit unsealed on 18 September 2024 in E.D. Pa. provides the botnet-takedown detail including device counts, CVE exploitation patterns, and the Integrity Technology Group attribution.

Supplementing those: Volexity, Lumen Black Lotus Labs, and Team Cymru published complementary analyses of Raptor Train infrastructure in late 2024. Lumen's 18 September 2024 blog on "Derailing the Raptor Train" contained the most detailed technical breakdown of the Sparrow command framework and the tier structure.

What does this mean for consumer IoT vendors?

Every Raptor Train device failed at the same controls: default credentials, unpatched CVEs, absent or lagging firmware updates, and no published minimum support period. Those are the exact failures that the UK PSTI Act targets and that the EU Cyber Resilience Act will require vendors to remediate as conformity-assessment obligations come online in 2026-2027.

Vendors whose products appeared in Raptor Train will face regulatory scrutiny under those regimes. The consumer-facing enforcement actions may be the first, but the commercial ripple matters more: enterprise TPRM teams now treat Raptor Train device-model inventories as a public signal of vendor supply chain posture.

How should enterprise defenders adapt to residential-proxy tradecraft?

Three shifts. First, detection logic cannot rely on IP reputation alone. Behavioral detections — impossible travel, session-anomaly scoring, unusual OAuth consent patterns — catch adversaries whose IPs look residential because they are residential. Microsoft Defender for Identity, Azure AD Identity Protection, and equivalent controls ship these primitives; the work is tuning them.

Second, remote-worker network posture matters for enterprise risk. A VPN client that backhauls employee traffic through a corporate egress neutralizes some residential-proxy tradecraft for attacker-initiated inbound access, and zero-trust policies that require device attestation block classes of compromise that originate from a compromised home router.

Third, vendor selection for employer-furnished home network equipment should favor vendors with documented firmware update pipelines, published minimum support periods, and a track record of remediating KEV-listed CVEs within weeks rather than quarters.

How does Raptor Train fit in the larger botnet takedown cadence?

The 2024-2025 period saw multiple state-aligned botnet disruptions. The Volt Typhoon "KV Botnet" takedown announced in January 2024 targeted another PRC-aligned SOHO-router network. The 911 S5 residential proxy takedown of May 2024, tied by DOJ indictment to a Chinese national operating since 2014, demonstrated the same pattern: consumer IoT devices compromised over time form the infrastructure layer of contemporary state-aligned operations.

CISA's 2024 advisory cadence reflected the shift: more edge-device-focused KEV additions, more joint advisories on SOHO-router exploitation, and clearer guidance to consumer IoT vendors on acceptable product posture. The Secure by Design pledge (May 2024) did not explicitly target consumer IoT, but its commitments on default passwords and MFA now serve as a reference standard the OPSS, the FTC, and enterprise buyers all cite.

How Safeguard.sh Helps

Safeguard.sh brings consumer and enterprise IoT into the same supply chain visibility surface. Eagle detection inventories network equipment by manufacturer, firmware version, and exposed services, correlates against CISA KEV (including the Raptor Train-adjacent TP-Link, DrayTek, ASUS, and Zyxel CVE set) and AA24-241A indicators, and flags devices whose posture matches Flax Typhoon's enabling conditions.

The zero-day pipeline monitors vendor PSIRT feeds, exploit broker traffic, and public research on SOHO-router and IP-camera CVEs, alerting operators before a new KEV addition becomes a botnet recruitment opportunity. SBOM lineage, where vendors publish it, follows firmware components through releases so a chipset-level fix can be propagated to the full affected fleet.

For TPRM, Safeguard.sh tracks consumer IoT and network-equipment vendors as first-class suppliers, monitoring their firmware update cadence, disclosure practice, and KEV response time. Lino compliance mapping aligns UK PSTI, EU CRA conformity requirements, CISA Secure by Design pledge items, and FTC Safeguards Rule obligations with the engineering evidence each regime now expects. Griffin AI remediation drafts the specific firmware-update policy, conditional-access rule, or vendor engagement needed to retire Raptor-class exposure from your environment.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.