Protect.Computer
NEWS

Joint Advisory Warns of Chinese Threat Actors Using Covert SOHO Networks

· 1 min read · Network safety Malware
Joint Advisory Warns of Chinese Threat Actors Using Covert SOHO Networks

A joint advisory issued by U.S. and international cybersecurity agencies has highlighted a significant shift in tactics by China-nexus cyber threat actors. Groups such as Volt Typhoon and Flax Typhoon are increasingly hijacking small office/home office (SOHO) routers and IoT devices to construct massive, covert operational networks.

The SOHO Botnet Threat

These nation-state actors are exploiting known vulnerabilities in consumer-grade networking equipment to build botnets. These networks of compromised devices are then used as proxy infrastructure to mask the origin of their attacks against critical infrastructure and corporate targets.

By routing their malicious traffic through residential IP addresses, these groups achieve:

  • Low-cost infrastructure: Utilizing compromised victim devices instead of purchasing servers.
  • Evasion: Bypassing geofencing and IP-based reputation filters, as the traffic appears to come from legitimate local internet service providers.
  • Deniability: Obscuring the true source of the cyber espionage activities.

Impact and Mitigation

The primary victims are organizations targeted by these APT groups; however, the individuals and small businesses whose routers are compromised suffer from reduced network performance and the risk of their IP addresses being blacklisted.

How to secure your SOHO network:

  1. Change Default Credentials: Never leave default administrator passwords on routers or IoT devices.
  2. Apply Firmware Updates: Regularly check for and install firmware updates provided by the device manufacturer. Many consumer routers do not update automatically.
  3. Disable Remote Management: Ensure that remote administrative access from the public internet (WAN) is disabled.
  4. Replace End-of-Life Devices: If a router is no longer supported by the manufacturer and no longer receives security updates, it must be replaced immediately.

For a comprehensive breakdown of the tactics, techniques, and procedures (TTPs) used by these actors, defenders should consult the full joint advisory.

Related reading