Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Security
  • /
  • NCSC and partners issue advice to counter campaign targeting devices

Security

NCSC and partners issue advice to counter campaign targeting devices

The National Cyber Security Centre (NCSC) – a part of GCHQ – has issued a new advisory alongside partners in the US, Australia, Canada and New Zealand, which reveals how a company based in China with links to China’s government, has managed a botnet consisting of over 260,000 compromised devices around the world.

Above: The National Cyber Security Centre (NCSC), Nova South, London.
Image by Simona Flamigni / copyright Shutterstock

The UK and international allies are urging individuals and organisations to take protective action after exposing a global network of compromised internet-connected devices operated by a China-linked company and used for malicious purposes.

Advertisement
ODU RT

A botnet is a network of internet-connected devices that are infected with malware and controlled by a group to conduct co-ordinated cyber attacks without the owners’ knowledge.

The compromised devices include routers, firewalls, and Internet of Things (IoT) devices – including webcams and CCTV cameras – which can then be used by the actors for a variety of malicious purposes, such as anonymous malware delivery and distributed denial of service (DDoS) attacks.

The advisory names Integrity Technology Group as responsible for controlling and managing the botnet, which has been active since mid-2021, and has been utilised by the malicious cyber actor commonly known as Flax Typhoon.

The advisory shares technical details and mitigation advice to help defend against malicious activity delivered through this botnet. It also highlights the risk to owners of how unpatched and end-of-life equipment can be exploited by malicious cyber actors.

Paul Chichester, NCSC Director of Operations, said: “Botnet operations represent a significant threat to the UK by exploiting vulnerabilities in everyday internet-connected devices with the potential to carry out large-scale cyber attacks.

“Whilst the majority of botnets are used to conduct coordinated DDoS attacks, we know that some also have the ability to steal sensitive information.

Advertisement
Leonardo animated rectangle

“That’s why the NCSC, along with our partners in Five Eyes countries, is strongly encouraging organisations and individuals to act on the guidance set out in this advisory – which includes applying updates to internet-connected devices – to help prevent their devices from joining a botnet.”

As with similar botnets, the botnet described in this advisory is composed of a network of devices, known as bots, which are infected with a type of malware that provides threat actors with unauthorised remote access.

To recruit a new ‘bot’, the botnet system first compromised an internet-connected device using a known vulnerability exploit which then provides access to establish a remote command and control execution.

This advisory has been co-sealed by the NCSC and agencies in the United States, Australia, Canada and New Zealand.

Read the advisory in full

Advertisement
Babcock LB Babcock LB
Smiths Detection and METCO to open manufacturing facility in Saudi Arabia

Security

Smiths Detection and METCO to open manufacturing facility in Saudi Arabia

17 December 2025

METCO and Smiths Detection today announced that the opening of its new assembly and manufacturing facility in Saudi Arabia, designed to assemble, commission and manufacture advanced screening solutions – including Smiths Detection’s X-ray screening products – is scheduled for early next year.

NCSC warns mistaking AI vulnerability could lead to large-scale breaches

Security

NCSC warns mistaking AI vulnerability could lead to large-scale breaches

16 December 2025

The National Cyber Security Centre (NCSC) – a part of GCHQ – has shared critical insights cautioning cyber security professionals against comparing prompt injection and more classical application vulnerabilities classed as SQL injection.

Tyron Runflat set to establish UK centre of excellence

Defence Security

Tyron Runflat set to establish UK centre of excellence

16 December 2025

Tyron Runflat has invested in doubling its facility with the ambition of creating its first UK centre of excellence within the next five years.

Spaceport Cornwall and National Drone Hub launch UAS project

Aerospace Defence Security Space

Spaceport Cornwall and National Drone Hub launch UAS project

15 December 2025

The UK's first licensed spaceport, Spaceport Cornwall, has commenced work on a groundbreaking project with the National Drone Hub to establish a unique testing environment for uncrewed aerial systems (UAS).

Advertisement
Leonardo animated rectangle
Smiths Detection’s SDX 100100 DV HC on TSA ACSTL

Aerospace Security

Smiths Detection’s SDX 100100 DV HC on TSA ACSTL

15 December 2025

Smiths Detection's SDX 100100 DV HC X-ray scanner has been added to the Transportation Security Administration’s Air Cargo Screening Technology List (ACSTL), enabling its use by regulated operators across the US air cargo sector.

JFD Global to enhance Polish Navy

Defence Security

JFD Global to enhance Polish Navy's submarine rescue capability

11 December 2025

James Fisher (JFD Global) has secured a contract with PGZ Stocznia Wojenna, which will see JFD Global integrate a combined, hyperbaric and saturation diving system into the Polish Navy’s new salvage and rescue vessel, Ratownik.

Advertisement
ODU RT