BigTech CompaniesCybersecurityNewswireTechnologyWhat's Buzzing

UK warns Chinese hackers use proxy networks to evade detection

▼ Summary

– China-nexus hackers are increasingly using large-scale proxy networks of hijacked consumer devices, such as routers and IoT devices, to evade detection and disguise malicious activity.
– The joint advisory, co-signed by ten countries including the US and UK, states most Chinese hacking groups have shifted to botnets of compromised small office and home office routers, cameras, and NAS equipment.
– One botnet, Raptor Train, infected over 260,000 devices in 2024 and was linked to Chinese state-sponsored hacking, while another, KV-Botnet, was used by Volt Typhoon and targeted vulnerable Cisco and Netgear routers.
– Traditional defenses based on blocking static IP lists are becoming less effective because these botnets continuously add new compromised nodes.
– Network defenders are advised to use multifactor authentication, map network edge devices, leverage dynamic threat feeds, and apply IP allowlists, zero-trust controls, and machine certificate verification.

The United Kingdom’s National Cyber Security Centre (NCSC-UK) , alongside a coalition of international intelligence partners, has issued a stark warning: Chinese-linked hackers are increasingly relying on massive proxy networks built from compromised consumer devices to mask their digital footprints and slip past traditional defenses.

The joint advisory, endorsed by agencies from the United States, Australia, Canada, Germany, Japan, the Netherlands, New Zealand, Spain, and Sweden, reveals a significant tactical shift. Instead of using dedicated, individually purchased infrastructure, most Chinese hacking groups now command vast botnets composed of hijacked devices. The primary targets for compromise are small office and home office (SOHO) routers, alongside internet-connected cameras, video recorders, and network-attached storage (NAS) equipment.

These sprawling networks function as sophisticated relay systems. Attackers route malicious traffic through a chain of compromised devices, entering at one point, hopping through multiple intermediate nodes, and emerging near their intended victim. This technique effectively obscures the origin of the attack and evades geographic-based detection.

“The NCSC believes that the majority of China-nexus threat actors are using these networks,” the advisory states. “Multiple covert networks have been created and are being constantly updated, and a single covert network could be being used by multiple actors.” The report emphasizes that these networks are “mainly made up of compromised SOHO routers, as well as IoT and smart devices.”

One prominent example is the Raptor Train botnet, which infected over 260,000 devices globally in 2024. The FBI linked this operation to the Chinese state-sponsored Flax Typhoon hacking group and the Chinese company Integrity Technology Group, which was sanctioned in January 2025. The FBI successfully disrupted Raptor Train in September 2024 with assistance from Black Lotus Labs, after tracing its use in campaigns targeting military, government, higher education, telecommunications, and defense industrial base (DIB) entities, primarily in the U. S. and Taiwan.

Another network, designated KV-Botnet, was leveraged by the Chinese state-backed Volt Typhoon threat group. It relied heavily on outdated Cisco and Netgear routers that no longer received security patches. The FBI dismantled KV-Botnet in January 2024 by wiping malware from infected devices, but Volt Typhoon began slowly reviving it in November 2024 after an earlier failed attempt in February.

“Botnet operations represent a significant threat to the UK by exploiting vulnerabilities in everyday internet-connected devices with the potential to carry out large-scale cyber attacks,” said Paul Chichester, NCSC-UK’s Director of Operations.

The advisory’s signatories warn that traditional defenses reliant on static lists of malicious IP addresses are losing their effectiveness. These botnets continuously add new compromised nodes, rendering such blocklists obsolete.

To counter this evolving threat, network defenders at organizations of all sizes are advised to adopt a multi-layered approach. Recommended measures include implementing multifactor authentication, mapping all network edge devices, utilizing dynamic threat feeds that incorporate known covert network indicators, and applying IP allowlists, zero-trust controls, and machine certificate verification where feasible.

(Source: BleepingComputer)

Topics

chinese cyber threats 98% proxy botnets 95% compromised iot devices 93% raptor train botnet 91% volt typhoon group 89% international cooperation 87% botnet disruption 85% network defense weaknesses 83% geographic evasion 81% soho router vulnerabilities 79%