Hackers Abuse Compromised Routers to Hide China-Linked Cyber Operations


China-linked hacking groups are using compromised routers, IoT devices, cameras, firewalls, and other edge systems to hide cyber operations against organizations worldwide. The UK’s National Cyber Security Centre and international partners warn that these “covert networks” help attackers mask their origin, steal sensitive data, keep long-term access, and make investigations harder.

The warning matters because these attacks do not always come from obvious hacker servers. They can appear to come from home routers, small office equipment, or smart devices owned by ordinary users and businesses. That makes blocking a single IP address far less useful than it once was.

The NCSC says China-nexus actors have made a major shift away from individually procured infrastructure and toward large-scale networks of compromised devices. The advisory says most China-nexus threat actors now use these networks, and multiple groups may share the same covert infrastructure.

Everyday devices are becoming attack infrastructure

These covert networks usually contain small office and home office routers, IoT devices, smart devices, cameras, video recorders, firewalls, and network-attached storage systems. Attackers target these devices because many run old firmware, use weak passwords, or stay exposed to the internet for years without proper monitoring.

Once attackers compromise a device, they can route malicious traffic through it. A victim organization may see traffic from a residential or small business connection instead of a suspicious foreign server. That creates confusion for defenders and gives the attacker a cheap way to hide.

The NCSC-led advisory says attackers can use these networks across every stage of an intrusion. That includes scanning targets, delivering malware, communicating with infected systems, researching victims, and exfiltrating stolen data.

What the covert network does

Stage of attackHow compromised devices help
ReconnaissanceAttackers scan targets through residential or small office IP addresses
Initial accessMalicious traffic blends with normal internet activity
Malware deliveryPayloads can move through relay devices instead of obvious attack servers
Command and controlCompromised routers can help hide communications with malware
Data theftStolen data can leave through rotating nodes, making tracing harder
Attribution avoidanceShared infrastructure makes it harder to link activity to one group

The advisory also raises a major problem for security teams: indicators can disappear quickly. If defenders block one set of IP addresses, attackers can move through another batch of compromised devices. Google Cloud’s threat team has described this problem as “IOC extinction,” where indicators of compromise lose value because these networks rotate and overlap so quickly.

This means static blocklists alone will not protect organizations. Security teams need better visibility into edge traffic, remote access behavior, VPN activity, and unusual login patterns. They also need dynamic threat intelligence that updates faster than traditional lists.

China-linked groups named in the warning

The advisory connects this wider trend to known China-nexus operations, including Volt Typhoon and Flax Typhoon. It says Volt Typhoon used covert networks to pre-position offensive cyber capabilities on critical national infrastructure, while Flax Typhoon used compromised infrastructure for cyber espionage.

One example is Raptor Train, a botnet that infected more than 200,000 devices worldwide in 2024. The advisory says it was controlled and managed by China’s Integrity Technology Group, which the FBI also linked to computer intrusion activity attributed to Flax Typhoon.

The U.S. Justice Department previously said a court-authorized operation disrupted a botnet used by PRC state-sponsored hackers, and that the FBI continued to investigate Integrity Technology Group and Flax Typhoon intrusion activity.

Why routers are so useful to attackers

Reuters sit at the edge of a network. They connect homes, offices, factories, branch locations, and remote workers to the internet. Many organizations do not monitor these devices as closely as laptops, servers, or cloud accounts.

That makes routers valuable to advanced threat actors. A compromised router can become a relay, a hiding place, or a stepping stone into bigger targets. It can also make malicious activity look like normal traffic from a trusted region or consumer internet provider.

The risk grows when organizations rely on remote access, third-party connections, and exposed edge systems. A single weak device can help attackers reach stronger targets without revealing their real infrastructure.

What organizations should do now

The NCSC says organizations should map and baseline edge device traffic, especially VPN and remote access connections. It also recommends dynamic threat feed filtering that includes known covert network indicators, along with zero trust controls where possible.

Security teams should start with these actions:

  • Map all routers, firewalls, VPN systems, and remote access gateways.
  • Patch edge devices and remove unsupported hardware.
  • Enforce multi-factor authentication for all remote access.
  • Restrict admin access to trusted networks.
  • Monitor unusual traffic from residential IP ranges.
  • Review outbound traffic from VPN, firewall, and proxy systems.
  • Use allow lists where business operations permit them.
  • Rotate passwords and remove default credentials from all edge devices.
  • Hunt for abnormal connections to unfamiliar infrastructure.
  • Replace devices that no longer receive vendor security updates.

Large and high-risk organizations should go further. They should apply machine learning-based anomaly detection, geographic profiling, machine certificate verification, and active threat hunting across suspicious SOHO, IoT, and VPN traffic.

Why this changes the defensive playbook

The main lesson is simple: defenders can no longer treat a suspicious IP address as a stable clue. China-linked actors can move through large pools of compromised devices, and different actors may use the same pool at different times.

That makes behavior more important than origin. Security teams should look at what a connection does, what account it touches, what device it uses, and whether it matches normal business activity.

For businesses, this also turns router maintenance into a security priority. Old firmware, exposed admin panels, and forgotten network appliances can help attackers even when the final target sits somewhere else.

FAQ

What are China-linked covert networks?

They are large networks of compromised routers, IoT devices, smart devices, and edge systems that attackers use to hide cyber operations. They work like proxy networks for espionage, malware delivery, command and control, and data theft.

Why are routers such a big target?

Routers often sit exposed at the edge of networks and may run outdated firmware. Attackers can use them to relay traffic and make attacks appear to come from normal homes or small businesses.

Which hacking groups are linked to this activity?

The advisory references China-nexus activity involving groups such as Volt Typhoon and Flax Typhoon. It also discusses Raptor Train, a botnet tied to compromised SOHO and IoT devices.

Can IP blocklists stop these attacks?

IP blocklists can help, but they cannot solve the problem alone. These networks rotate devices and share nodes, which means indicators can expire quickly.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages