UK Warns of Chinese Hackers Using Proxy Networks to Evade Detection

The UK warns of a rising threat from Chinese hackers using proxy networks of hijacked devices. This tactic complicates detection and poses serious cybersecurity risks. Organizations must enhance their defenses against these evolving threats.

Threat IntelHIGHUpdated: Published:
Featured image for UK Warns of Chinese Hackers Using Proxy Networks to Evade Detection

Original Reporting

BCBleepingComputerΒ·Sergiu Gatlan

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Basically, Chinese hackers are using stolen devices to hide their online attacks.

What Happened

The United Kingdom's National Cyber Security Centre (NCSC-UK) has issued a warning about Chinese hackers increasingly utilizing large-scale proxy networks made up of hijacked consumer devices. This advisory, supported by international partners, highlights a shift from individual infrastructure to massive botnets comprised mainly of small office and home office (SOHO) routers, internet-connected cameras, and other IoT devices.

The Threat

These botnets enable hackers to route their traffic through multiple compromised devices, effectively disguising their malicious activities. The NCSC believes that many threat actors from China are employing these networks, which are continuously updated and can be used by multiple groups simultaneously. This method complicates detection efforts significantly.

Who's Behind It

One notable example is the Raptor Train botnet, which infected over 260,000 devices globally and was linked to the Chinese state-sponsored Flax Typhoon hacking group. Another network, the KV-Botnet, was associated with the Volt Typhoon group, primarily targeting vulnerable Cisco and Netgear routers that lacked security updates.

Tactics & Techniques

Traditional defense strategies that rely on blocking static IP addresses are becoming less effective against these dynamic botnets. The advisory emphasizes the need for network defenders to adopt more robust security measures, including:

  • Implementing multifactor authentication
  • Mapping network edge devices
  • Utilizing dynamic threat feeds
  • Applying IP allowlists and zero-trust controls

Defensive Measures

The NCSC-UK's Director of Operations, Paul Chichester, stated that botnet operations pose a significant threat by exploiting vulnerabilities in everyday internet-connected devices. Organizations of all sizes are urged to enhance their security postures to mitigate potential risks associated with these evolving tactics.

In summary, the rise of sophisticated proxy networks used by Chinese hackers underscores the need for heightened vigilance and proactive measures in cybersecurity.

πŸ”’ Pro Insight

πŸ”’ Pro insight: The shift to botnet-based operations signifies a strategic evolution in Chinese cyber tactics, necessitating an urgent reevaluation of defensive measures.

BCBleepingComputerΒ· Sergiu Gatlan
Read Original

Related Pings