
π―Basically, Chinese hackers are using stolen devices to hide their online attacks.
What Happened
The United Kingdom's National Cyber Security Centre (NCSC-UK) has issued a warning about Chinese hackers increasingly utilizing large-scale proxy networks made up of hijacked consumer devices. This advisory, supported by international partners, highlights a shift from individual infrastructure to massive botnets comprised mainly of small office and home office (SOHO) routers, internet-connected cameras, and other IoT devices.
The Threat
These botnets enable hackers to route their traffic through multiple compromised devices, effectively disguising their malicious activities. The NCSC believes that many threat actors from China are employing these networks, which are continuously updated and can be used by multiple groups simultaneously. This method complicates detection efforts significantly.
Who's Behind It
One notable example is the Raptor Train botnet, which infected over 260,000 devices globally and was linked to the Chinese state-sponsored Flax Typhoon hacking group. Another network, the KV-Botnet, was associated with the Volt Typhoon group, primarily targeting vulnerable Cisco and Netgear routers that lacked security updates.
Tactics & Techniques
Traditional defense strategies that rely on blocking static IP addresses are becoming less effective against these dynamic botnets. The advisory emphasizes the need for network defenders to adopt more robust security measures, including:
- Implementing multifactor authentication
- Mapping network edge devices
- Utilizing dynamic threat feeds
- Applying IP allowlists and zero-trust controls
Defensive Measures
The NCSC-UK's Director of Operations, Paul Chichester, stated that botnet operations pose a significant threat by exploiting vulnerabilities in everyday internet-connected devices. Organizations of all sizes are urged to enhance their security postures to mitigate potential risks associated with these evolving tactics.
In summary, the rise of sophisticated proxy networks used by Chinese hackers underscores the need for heightened vigilance and proactive measures in cybersecurity.
π Pro insight: The shift to botnet-based operations signifies a strategic evolution in Chinese cyber tactics, necessitating an urgent reevaluation of defensive measures.

