Singapore Identifies 2,700 Infected Devices in Global Botnet Takedown

otonata dragonfly identifying infected devices

Singapore authorities recently identified approximately 2,700 infected devices in a global cyber operation aimed at dismantling an extensive botnet network. Minister for Digital Development and Information, Josephine Teo, explained that these infections primarily resulted from poor cyber hygiene, with attackers exploiting weak passwords and misconfigured internet-connected devices like routers and baby monitors. “While no Critical Information Infrastructure (CII) was impacted, these devices could have been used as launchpads for cyberattacks,” she stated.

The operation, which took place in 2024, targeted malware that recruited compromised devices into a botnet, a network of infected computers often used for cyberattacks such as distributed denial-of-service (DDoS) attacks and spam campaigns. The Cyber Security Agency of Singapore (CSA) played a key role in supporting the international effort to mitigate the threat.

The operation involved neutralizing malware on compromised devices and notifying owners to secure their systems. Since then, CSA has monitored previously infected devices to ensure the malware has been fully removed.

Teo warned about the dangers had the botnet remained active, stating, “Had the network been activated, it could have been used for cyber espionage, data theft, or large-scale disruptions.” She also raised concerns about the increasing use of botnets in state-sponsored cyber operations aimed at gaining geopolitical influence.

In response, the Singapore government has reaffirmed its commitment to enhancing national cybersecurity measures, urging businesses and individuals to adopt stronger cyber hygiene practices. CSA continues to work closely with global partners to mitigate future threats.

This incident highlights the growing threat of cyberattacks and the importance of understanding how botnets operate, as well as the need for strong cybersecurity practices to protect both individuals and critical infrastructure from potential harm.

Authorities advise users to regularly update firmware, use strong passwords, and enable multi-factor authentication to prevent future compromises. At Otonata, we encourage businesses and individuals to strengthen their cybersecurity measures and stay vigilant to prevent falling victim to emerging threats like botnets.

Scroll to Top