Key Takeaways
- State‑linked Chinese cyber actors are increasingly hijacking everyday consumer and enterprise devices to form large, fluid botnets that conceal their operations.
- These “covert networks” route malicious traffic through hundreds of thousands of compromised routers, cameras, and storage systems, making attribution and defense far more difficult.
- Traditional defenses that rely on static indicators (e.g., blocking known malicious IP addresses) are ineffective because attackers constantly rotate through infected devices—an effect described as “IOC extinction.”
- Effective defense now requires adaptive, intelligence‑driven measures: continuous device inventory, traffic baselining, multi‑factor authentication, allow‑listing, zero‑trust architectures, and advanced analytics such as machine‑learning anomaly detection and NetFlow analysis.
- Organizations of all sizes—especially critical infrastructure—must treat botnets as persistent threats and actively hunt for suspicious traffic originating from consumer‑grade devices.
- The widespread exploitation of everyday technology blurs the line between legitimate and malicious traffic, creating a shared responsibility for securing the broader internet ecosystem.
A Strategic Shift in Cyber Warfare
International cybersecurity agencies, including the UK’s National Cyber Security Centre (NCSC), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI), have issued an urgent advisory highlighting a major evolution in state‑linked cyber operations tied to the People’s Republic of China. Threat actors are moving away from dedicated attack infrastructure and instead leveraging vast networks of compromised everyday devices—commonly referred to as botnets—to conceal their activities. This shift marks a turning point in how cyber espionage and attacks are planned and executed, emphasizing stealth and scalability over reliance on easily traceable servers or domains.
Covert Networks: A Growing and Elusive Threat
The emerging tactic involves routing malicious traffic through thousands—or even hundreds of thousands—of compromised devices worldwide, each acting as a node in a “covert network.” By hopping traffic across many intermediate points, attackers obscure the true origin of their operations, making detection and attribution considerably harder. These networks are now employed throughout the entire attack lifecycle, from initial reconnaissance and lateral movement to data exfiltration and persistence. Notable Chinese‑linked groups such as Volt Typhoon and Flax Typhoon have been observed using this approach to infiltrate critical‑infrastructure systems and conduct espionage campaigns, respectively.
An Illustrative Case: The Raptor Train Botnet
One conspicuous example is the botnet dubbed Raptor Train, which allegedly infected more than 200,000 devices globally. Investigators traced its operation to a Chinese technology firm, raising concerns about potential collaboration between state actors and private‑sector entities in building and sustaining such infrastructures. While botnets themselves are not new, the scale, persistence, and strategic integration of these networks into state‑backed operations represent a significant escalation in cyber threat capabilities.
Anatomy of a Modern Botnet
Unlike traditional botnets that rely on a relatively static command‑and‑control structure, the contemporary networks described in the advisory are fluid and constantly reshaping. Analysts outline a typical three‑stage pattern:
- Entry node (on‑ramp) – The attacker gains initial access to the network via a compromised device.
- Traversal nodes – Malicious traffic is relayed through multiple intermediate compromised devices, each adding a layer of obfuscation.
- Exit node – The final device forwards the traffic to the intended target, often chosen to appear geographically proximate to the victim.
This layered routing dramatically complicates forensic tracing. Compounding the issue, many of the compromised devices are outdated or “end‑of‑life,” meaning they no longer receive security patches and remain perpetually vulnerable to exploitation.
Why Traditional Defences Are Failing
Conventional security measures—such as blocking IP addresses known to be associated with malicious activity—are losing effectiveness. Analysts term this phenomenon “IOC extinction” (Indicator of Compromise extinction). Because attackers can rapidly rotate through thousands of infected devices, any single IP address becomes irrelevant almost instantly. Furthermore, the infrastructure is shared across multiple threat actors, creating a moving target that defies static blacklists. Reports from firms like Mandiant confirm that defenders now face a dynamic environment where the underlying attack surface changes continuously, rendering legacy defenses inadequate.
Defensive Measures: A Shift Toward Adaptive Security
To counter this evolving threat, authorities recommend a layered, adaptive security posture tailored to an organization’s risk profile.
For All Organisations
- Maintain a detailed inventory of all network‑connected devices.
- Establish baselines for normal traffic patterns to spot deviations.
- Enforce multi‑factor authentication (MFA) across all privileged accounts.
- Subscribe to real‑time threat‑intelligence feeds to stay abreast of emerging IOCs.
For Higher‑Risk Organisations
- Replace block lists with allow lists, permitting only pre‑approved connections.
- Apply geographic and behavioural filtering to limit traffic from anomalous regions or patterns.
- Adopt zero‑trust architectures, assuming no connection is inherently trustworthy.
- Reduce the exposure of internet‑facing systems by minimizing unnecessary open ports and services.
For Critical Infrastructure and Advanced Defenders
- Actively hunt for suspicious traffic emanating from consumer‑grade devices (e.g., home routers, IP cameras).
- Treat botnets as persistent threats, monitoring them continuously rather than as isolated incidents.
- Leverage machine‑learning models to detect subtle anomalies in network behaviour that may indicate covert routing.
- Analyse flow data (such as NetFlow or IPFIX) to uncover hidden network structures and identify traffic that traverses unexpected chains of devices.
NCSC Resources & Best Practices
In addition to the above guidance, the NCSC provides a suite of cybersecurity best practices that reinforce resilience against botnet‑based threats. These include regular patch management, secure configuration of devices, network segmentation, and robust incident‑response planning. Organizations are encouraged to consult the NCSC’s online toolkits and advisories for detailed implementation steps tailored to their specific environments.
Broader Implications: A Persistent Global Risk
The widespread exploitation of everyday devices extends risk beyond individual enterprises to the global populace. As Paul Chichester, Director of Operations at the NCSC, observed, botnet operations constitute a “significant threat” because they harness ubiquitous technologies for large‑scale attacks. Moreover, the dual‑use nature of these networks—wherein compromised devices may still carry legitimate traffic—further obscures detection and complicates attribution. This blurring of benign and malicious activity underscores a shared responsibility: securing not only proprietary systems but also the broader ecosystem of interconnected devices that underpins the modern internet.
Conclusion
The advisory makes clear that cyber threats are no longer confined to specialized, easily identifiable infrastructure; they are now woven into the fabric of everyday technology. As attackers continue to innovate, defense strategies must evolve from static, signature‑based protections to dynamic, intelligence‑driven models that anticipate change, monitor behaviour, and adapt in real time. Governments, private enterprises, and individual users alike must collaborate to harden the global device landscape, thereby reducing the avenues through which state‑linked actors can conceal and amplify their cyber operations. Only through such coordinated, proactive effort can the international community hope to mitigate this persistent and escalating risk.

