Executive Summary
In April 2026, the UK's National Cyber Security Centre (NCSC) and international partners issued a warning about Chinese state-sponsored hackers employing large-scale proxy networks composed of hijacked consumer devices to evade detection. These botnets, primarily consisting of compromised small office/home office (SOHO) routers and Internet of Things (IoT) devices, enable attackers to route malicious traffic through multiple nodes, obscuring their origins and complicating attribution. This tactic has been linked to groups such as Flax Typhoon and Volt Typhoon, which have targeted critical infrastructure sectors including military, government, telecommunications, and IT.
The increasing use of such covert networks signifies a strategic shift in cyber operations, highlighting the need for enhanced security measures. Organizations are advised to implement multifactor authentication, monitor network edge devices, utilize dynamic threat intelligence feeds, and adopt zero-trust architectures to mitigate the risks posed by these evolving threats.
Why This Matters Now
The adoption of large-scale proxy networks by state-sponsored actors like those from China represents a significant evolution in cyberattack methodologies, making traditional defense mechanisms less effective. This underscores the urgency for organizations to reassess and strengthen their cybersecurity postures to protect against increasingly sophisticated threats.
Attack Path Analysis
Chinese state-sponsored hackers compromised small office and home office (SOHO) routers and IoT devices to establish large-scale proxy networks, enabling them to evade detection and disguise their malicious activities. They escalated privileges by exploiting vulnerabilities in these devices, gaining deeper access to the network. Utilizing the compromised devices, attackers moved laterally within the network to identify and access high-value targets. They established command and control channels through the proxy networks, maintaining persistent access and control over the compromised systems. Sensitive data was exfiltrated through the proxy networks, obscuring the origin and destination of the data transfers. The impact included significant data breaches and potential disruption of critical services due to the attackers' prolonged and undetected presence.
Kill Chain Progression
Initial Compromise
Description
Chinese state-sponsored hackers compromised small office and home office (SOHO) routers and IoT devices to establish large-scale proxy networks, enabling them to evade detection and disguise their malicious activities.
MITRE ATT&CK® Techniques
Compromise Infrastructure: Botnet
Proxy
Proxy: Multi-hop Proxy
Compromise Infrastructure: Network Devices
Valid Accounts
Valid Accounts: Local Accounts
Valid Accounts: Cloud Accounts
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected parties.
Control ID: 6.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Network and Environment Segmentation
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
Chinese nation-state actors using compromised SOHO routers and IoT devices create massive proxy networks, directly threatening telecom infrastructure and enabling lateral movement through encrypted traffic channels.
Government Administration
Nation-state espionage campaigns specifically target government entities using botnet proxy networks to evade detection while exfiltrating sensitive data through compromised edge devices and weakened segmentation controls.
Higher Education/Acadamia
Academic institutions face targeted attacks through compromised campus IoT devices and routers, enabling covert command-and-control operations while bypassing traditional IP-based security defenses and compliance frameworks.
Defense/Space
Defense industrial base entities experience sophisticated proxy network infiltration designed to establish persistent access, conduct surveillance operations, and exfiltrate classified information through encrypted channels and segmentation bypasses.
Sources
- UK warns of Chinese hackers using proxy networks to evade detectionhttps://www.bleepingcomputer.com/news/security/uk-warns-of-chinese-hackers-using-botnets-of-hijacked-consumer-devices-to-evade-detection/Verified
- Defending against China-nexus covert networks of compromised deviceshttps://www.ncsc.gov.uk/news/defending-against-china-nexus-covert-networks-of-compromised-devicesVerified
- NCSC and partners issue advice to counter China-linked campaign targeting thousands of deviceshttps://www.ncsc.gov.uk/news/ncsc-and-partners-issue-advice-to-counter-china-linked-campaign-targeting-thousands-of-devicesVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it embeds security directly into the cloud fabric, potentially limiting attackers' ability to exploit internal network pathways and reducing the blast radius of their activities.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The establishment of unauthorized proxy networks could likely be constrained, reducing the attackers' ability to mask their activities.
Control: Zero Trust Segmentation
Mitigation: The scope of privilege escalation could likely be limited, reducing the attackers' ability to gain deeper network access.
Control: East-West Traffic Security
Mitigation: Lateral movement within the network could likely be constrained, reducing the attackers' ability to access high-value targets.
Control: Multicloud Visibility & Control
Mitigation: The establishment of command and control channels could likely be constrained, reducing the attackers' ability to maintain persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: Data exfiltration through unauthorized channels could likely be constrained, reducing the attackers' ability to transfer sensitive data.
The overall impact of data breaches and service disruptions could likely be reduced, limiting the attackers' ability to cause prolonged and undetected harm.
Impact at a Glance
Affected Business Functions
- Network Operations
- Data Security
- Customer Services
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive customer data and internal communications due to compromised network devices.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement within the network.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Utilize Multicloud Visibility & Control to detect and respond to anomalous activities across cloud environments.
- • Apply Inline IPS (Suricata) to identify and block known exploit patterns and malicious payloads.
- • Ensure regular updates and patches for all network devices to mitigate vulnerabilities exploited by attackers.



