China-aligned threat actors expanding botnet infrastructure via compromised SOHO devices for sustained operations
Summary
Hide ▲
Show ▼
China-nexus cyber actors are systematically industrializing botnets composed primarily of compromised small office/home office (SOHO) routers and consumer IoT devices to support low-signature, high-deniability operations against US and allied organizations. These covert networks are maintained at scale by dedicated teams—potentially affiliated with Chinese information security firms—who continuously update and expand the botnets, while distributing access to multiple state-backed groups such as Flax Typhoon and Volt Typhoon. The infrastructure enables reconnaissance, malware delivery, command-and-control, data exfiltration, and deniable browsing, complicating attribution and defensive countermeasures. The advisory emphasizes that while botnet usage is not new, the strategic scale, tempo, and division of labor in China-aligned operations represent a marked escalation. Organizations are urged to implement network edge profiling, zero-trust controls, and threat hunting to detect anomalous connectivity patterns from consumer broadband ranges and known covert nodes.
Timeline
-
23.04.2026 23:52 1 articles · 4h ago
China-backed actors expand botnet infrastructure via SOHO/IoT devices for sustained, deniable operations
NCSC-UK, CISA, and allied agencies report that China-nexus threat actors are maintaining large, dynamic botnets composed largely of compromised SOHO routers and consumer IoT devices. These botnets are centrally managed by specialized teams—potentially linked to Chinese information security firms—and distributed for use across multiple state-backed groups, including Flax Typhoon and Volt Typhoon. The infrastructure supports low-signature operations such as reconnaissance, C2, and data exfiltration, while enabling deniable browsing and research into new TTPs. The advisory notes that while botnet usage is not novel, the strategic scale, tempo, and division-of-labor model represent a significant escalation, complicating attribution and defensive actions such as static IP blocking.
Show sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52
Information Snippets
-
China-aligned threat actors are maintaining large, dynamic botnets primarily composed of compromised SOHO routers and consumer IoT devices, with nodes frequently refreshed due to patching or device replacement.
First reported: 23.04.2026 23:521 source, 1 articleShow sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52
-
Multiple China-nexus groups, including Flax Typhoon and Volt Typhoon, are observed leveraging the same covert networks simultaneously, increasing operational overlap and complicating attribution.
First reported: 23.04.2026 23:521 source, 1 articleShow sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52
-
The botnets are managed by specialized teams—potentially linked to Chinese information security companies—that continuously update infrastructure in response to defensive or legal actions, enhancing persistence and deniability.
First reported: 23.04.2026 23:521 source, 1 articleShow sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52
-
Covert networks are used for reconnaissance, malware delivery and C2, data exfiltration, and deniable browsing, including research into new TTPs and victim profiling without attribution risk.
First reported: 23.04.2026 23:521 source, 1 articleShow sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52
-
Static malicious IP blocking is ineffective against these botnets due to their size (potentially hundreds of thousands of endpoints), dynamic node churn, and multi-actor usage.
First reported: 23.04.2026 23:521 source, 1 articleShow sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52
-
US government recently banned import of new routers made outside the US, citing concerns over deliberate inclusion of structural vulnerabilities such as default credentials and lack of patching.
First reported: 23.04.2026 23:521 source, 1 articleShow sources
- China-Backed Hackers Are Industrializing Botnets — www.darkreading.com — 23.04.2026 23:52