China-Backed Groups are Using Massive Botnets in Espionage, Intrusion Campaigns
None
<p>China-nexus threat groups like <a href="https://securityboulevard.com/2024/03/cisa-nsa-others-outline-security-steps-against-volt-typhoon/" target="_blank" rel="noopener">Volt Typhoon</a> and <a href="https://securityboulevard.com/2025/10/chinas-flax-typhoon-exploits-arcgis-app-for-year-long-persistence/" target="_blank" rel="noopener">Flax Typhoon</a> over the past few years have built multiple large botnets from compromised consumer devices and are using them in their attacks for their cyber espionage efforts and intrusions into critical infrastructure environments, according to U.S. and security agencies from other countries.</p><p>In an <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-113a" target="_blank" rel="noopener">advisory</a> issued by CISA, the agencies said the China-linked actors are transitioning away from dedicated infrastructure to so-called “covert networks” comprising compromised small-office, home office (SOHO), Internet of Things (IoT), and smart devices that are constantly updated.</p><p>“The use of covert networks of compromised devices – also known as botnets – to facilitate malicious cyber activity is not new, but China-nexus cyber actors are now using them strategically, and at scale,” CISA wrote in the advisory, which also included security agencies from such countries as Australia, Germany, Japan, and Spain. “Covert networks are used to connect across the internet in a low-cost, low-risk, deniable way, disguising the origin and attribution of malicious activity.”</p><p>Indeed, such botnets have been used for years by financially motivated bad actors for a broad range of activities, from distributed denial-of-service (DDoS) and credential attacks to spam and phishing campaigns and malware distribution.</p><p>Now state-sponsored threat groups linked to China and its intelligence agencies are using them for every part of their operations, from running scans for reconnaissance and delivering and communicating with malware to exfiltrating stolen data.</p><h3>Evading Detection</h3><p>“They can also be used for general deniable internet browsing, allowing threat actors to research exploitation techniques, new TTPs [tactics, techniques and procedures], and their victims without attribution,” CISA wrote. “Some covert networks are also used by legitimate customers to browse the internet, making it challenging to attribute malicious activity.”</p><p>CISA noted that Volt Typhoon, which two years ago was found to have infiltrated the networks of critical infrastructure companies in such sectors as communications and energy, has used covert networks and that Flax Typhoon used a different botnet to run cyber espionage campaigns.</p><p>The covert networks are created and maintained by information security companies in China, according to the security agencies. They pointed to Raptor Train, a botnet controlled and managed by Chinese company Integrity Technology Group and comprising more than 200,000 infected devices. The FBI also said the company was involved in a <a href="https://www.justice.gov/archives/opa/pr/court-authorized-operation-disrupts-worldwide-botnet-used-peoples-republic-china-state" target="_blank" rel="noopener">computer-intrusion campaign</a> by Flax Typhoon.</p><h3>Edge Devices Targeted</h3><p>Most of the botnets are made up of SOHO network routers, but other vulnerable devices are included as well. CISA pointed to Raptor Train as an example, noting that along with the routers, it consisted of such IoT devices as web cameras and video recorders, along with firewalls and network-attached storage (NAS) devices. Another covert network, <a href="https://securityboulevard.com/2024/02/china-sponsored-hackers-lie-in-wait-to-attack-u-s-infrastructure/" target="_blank" rel="noopener">KV Botnet, used by Volt Typhoon</a>, primarily comprised vulnerable routers from Cisco and NetGear.</p><p>“The edge devices were vulnerable because they were ‘end of life’ – out of date and no longer receiving updates or security patches by their manufacturers,” CISA wrote.</p><p>The embrace by China-nexus groups for such botnets isn’t surprising, but organizations need to take note, said Bradley Smith, senior vice president and deputy CISO for security firm BeyondTrust.</p><p>“The shift CISA is describing, from individually procured infrastructure to externally provisioned networks of compromised devices, has been visible to practitioners tracking China-nexus operations at the network layer for years,” Smith said. “The scale and the degree of operational specialization behind it have changed.”</p><h3>Ensure IoT Device Security</h3><p>The fact that so many IoT devices are being compromised and used in the covert networks is a sign that enterprises are being lax in ensuring the security of the devices, which are widely used present in organizations, according to John Gallagher, vice president of Viakoo Labs, the research arm of security firm Viakoo, who added that the shift from using them to steal data to comprising operational technology environment is expanding.</p><p>“It would be trivializing the issue to view it as SOHO and consumer IoT devices; it’s all IoT devices, especially those used inside an enterprise,” Gallagher said. “That’s why this CISA advisory specifically called out best practices for large and ‘the largest’ organizations. The advantage operators of botnet armies gain from compromising enterprise routers, cameras, NAS drives, and other forms of IoT is that they are approved members of that network, and can use the privileges and credentials of the host organization to go undetected.”</p><p>He said that “threat actors aren’t just hacking your IoT cameras or routers to steal their data; they are using them as proxies to route attack traffic through a ‘clean’ IP address of a localized IoT device, and establish a position of control within the network. By hiding within an enterprise, they can bypass geographical IP filtering and behavior-based detection that usually flags traffic from foreign adversary nations.”</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/china-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns/" data-a2a-title="China-Backed Groups are Using Massive Botnets in Espionage, Intrusion Campaigns"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fchina-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns%2F&linkname=China-Backed%20Groups%20are%20Using%20Massive%20Botnets%20in%20Espionage%2C%20Intrusion%20Campaigns" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fchina-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns%2F&linkname=China-Backed%20Groups%20are%20Using%20Massive%20Botnets%20in%20Espionage%2C%20Intrusion%20Campaigns" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fchina-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns%2F&linkname=China-Backed%20Groups%20are%20Using%20Massive%20Botnets%20in%20Espionage%2C%20Intrusion%20Campaigns" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fchina-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns%2F&linkname=China-Backed%20Groups%20are%20Using%20Massive%20Botnets%20in%20Espionage%2C%20Intrusion%20Campaigns" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fchina-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns%2F&linkname=China-Backed%20Groups%20are%20Using%20Massive%20Botnets%20in%20Espionage%2C%20Intrusion%20Campaigns" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>