Changeflow GovPing Data Privacy & Cybersecurity China-Nexus Covert Networks Target SOHO Routers...
Priority review Guidance Added Final

China-Nexus Covert Networks Target SOHO Routers, IoT Devices

Favicon for www.ncsc.gov.uk NCSC UK News
Detected
Email

Summary

NCSC-UK and 15 international partner agencies have issued a joint advisory on the shift in China-nexus cyber actors' tactics towards using large-scale covert networks (botnets) of compromised SOHO routers and IoT devices. The advisory names specific threat actors including Volt Typhoon and Flax Typhoon, and references the Raptor Train botnet which infected over 200,000 devices worldwide in 2024. Protective advice for network defenders includes identifying end-of-life devices, reviewing logs for indicators of compromise, and implementing mitigations for organizations potentially targeted by these actors.

Why this matters

Organizations should review the device inventory for end-of-life SOHO routers, IoT devices, and other edge equipment — the advisory specifically notes these devices were vulnerable because they were 'end of life' and no longer receiving security patches. Network defenders should also review logs for indicators of compromise associated with the named botnets (Raptor Train, KV Botnet) and assess whether current detection methods account for the dynamic nature of covert networks where endpoints change constantly.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by NCSC-UK on ncsc.gov.uk . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors NCSC UK News for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 9 changes logged to date.

What changed

This joint advisory from NCSC-UK and 15 international partner agencies describes a major shift in China-nexus cyber actors' tactics, techniques, and procedures (TTPs), moving from individually procured infrastructure to externally provisioned networks of compromised devices known as covert networks or botnets. The advisory identifies these networks as primarily consisting of compromised SOHO routers, IoT devices, web cameras, video recorders, firewalls, and NAS devices, many of which are end-of-life and no longer receiving security updates.

Organizations that may be targets of China-nexus cyber actors should review the advisory's protective recommendations, which include auditing network-connected devices for end-of-life status, reviewing logs for indicators of compromise associated with named botnets, and implementing defensive measures appropriate to their risk profile. The advisory notes that static IP block lists are less effective against these dynamic networks where nodes are constantly being added and removed.

Archived snapshot

Apr 24, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

News Download & print article PDF

Defending against China-nexus covert networks of compromised devices

Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defend against it

On this page

Summary

With support from the UK Cyber League, this advisory has been jointly released by the National Cyber Security Centre (NCSC-UK) and international partners:

  • Australian Signals Directorate’s (ASD’s) Australian Cyber Security Centre (ACSC)
  • Communications Security Establishment Canada's (CSE's) Canadian Centre for Cyber Security (Cyber Centre)
  • Germany Federal Office for the Protection of the Constitution - Bundesamt für Verfassungsschutz (BfV)
  • Germany Federal Intelligence Service – Bundesnachrichtendienst (BND)
  • Germany Federal Office for Information Security - Bundesamt für Sicherheit in der Informationstechnik (BSI)
  • Japan National Cybersecurity Office (NCO) - 国家サイバー統括室
  • Netherlands General Intelligence and Security Service - Algemene Inlichtingen- en Veiligheidsdienst (AIVD)
  • Netherlands Defence Intelligence and Security Service - Militaire Inlichtingen- en Veiligheidsdienst (MIVD)
  • New Zealand National Cyber Security Centre (NCSC-NZ)
  • Spain National Cryptologic Centre - Centro Criptológico Nacional (CCN)
  • Sweden National Cyber Security Centre - Nationellt cybersäkerhetscenter (NCSC-SE)
  • United States Cybersecurity and Infrastructure Security Agency (CISA)
  • United States Department of Defense Cyber Crime Center (DC3)
  • United States Federal Bureau of Investigation (FBI)
  • United States National Security Agency (NSA) Its purpose is to provide network defenders with the tools needed to defend against China-nexus cyber actors and their tactic of using large scale networks of compromised devices (covert networks) to route their cyber activity.

Introduction

Over the past few years there has been a major shift in the tactics, techniques and procedures (TTPs) used by China-nexus cyber actors, moving away from the use of individually procured infrastructure, and towards the use of externally provisioned, large-scale networks of compromised devices.

The NCSC believes that the majority of China-nexus threat actors are using these networks (hereafter “covert networks”), that multiple covert networks have been created and are being constantly updated, and that a single covert network could be being used by multiple actors. These networks are mainly made up of compromised Small Office Home Office (SOHO) routers, as well as Internet of Things (IoT) and smart devices.

Anyone who is a target of China-nexus cyber actors may be impacted by the use of covert networks. They have been used by Chinese state-sponsored actors Volt Typhoon to pre-position offensive cyber capabilities on critical national infrastructure. The group Flax Typhoon used a different covert network of compromised infrastructure to conduct cyber espionage.
The use of covert networks of compromised devices - also known as botnets - to facilitate malicious cyber activity is not new, but China-nexus cyber actors are now using them strategically, and at scale.

This advisory describes the typical makeup of a covert network and what they are being used for. It also includes protective advice for organisations being targeted by cyber activity using a covert network as an access vector.


Covert Networks

Covert networks are used to connect across the internet in a low-cost, low-risk, deniable way, disguising the origin and attribution of malicious activity. Actors have been observed using them for each phase of their Cyber Kill Chains, from performing scans as part of reconnaissance, to the delivery of malware, communicating with said malware, and exfiltrating stolen data from a victim. They can also be used for general deniable internet browsing, allowing threat actors to research exploitation techniques, new TTPs, and their victims without attribution. Some covert networks are also used by legitimate customers to browse the internet, making it challenging to attribute malicious activity.

There is evidence that covert networks used by China-nexus actors are created and maintained by Chinese information security companies. A network known to network defenders as Raptor Train, which in 2024 infected more than 200,000 devices worldwide, was controlled and managed by the Chinese company, Integrity Technology Group. This company was also assessed by the FBI to be responsible for the computer intrusion activities attributed to China-based hackers known as Flax Typhoon.

“Botnet operations represent a significant threat to the UK by exploiting vulnerabilities in everyday internet-connected devices with the potential to carry out large-scale cyber attacks”

NCSC Director of Operations, Paul Chichester
Covert networks mostly consist of compromised SOHO routers, but they also pull in any vulnerable device they can exploit at scale. Raptor Train was made up of thousands of SOHO routers and IoT devices, such as web cameras and video recorders, as well as firewalls and Network Attached Storage (NAS) devices. The KV Botnet used by Volt Typhoon was mainly made up of vulnerable Cisco and NetGear routers. The edge devices were vulnerable because they were “end of life” – out of date and no longer receiving updates or security patches by their manufacturers.

The cyber security industry has been aware of examples of these networks for some time and has publicly reported on the widespread scale of the threat and its implications. Mandiant Intelligence produced a public blog in May 2024 talking about covert networks in which they highlighted a key issue for defenders – indicator of compromise (IOC) Extinction. If a particular threat group could now come from one of many covert networks, each with potentially hundreds of thousands of endpoints, and each used by multiple threat actors, old network defence paradigms of static malicious IP block lists will be less effective. This is compounded by the dynamic nature of these networks where new nodes will be added as old devices are patched or removed from use.


Typical Network Topology

The number of covert networks used by China-nexus cyber actors is large, with new networks regularly developed and deployed. The existing covert networks change too, either because of defensive or legal action, or simply as a result of software updates and new exploits being used to target different technologies for incorporation into the network.

Because of this, a description of all known covert networks in detail, including how they are constructed and how they communicate, would immediately be out of date – and for most network defenders would not be practically useful.

However, most covert networks of compromised devices use the same basic set up. Understanding this generalised structure can aid researchers and defenders by helping them to understand which part of a network they may have found, and how to defend against it.

A diagram illustrating the basic setup of a covert network

The diagram above illustrates the basic setup of a covert network, where typically an actor will connect to the network via an on-ramp or entry node. Their traffic will be forwarded through multiple compromised devices, used as traversal nodes, before exiting the network from an exit node, usually in the same geographic region as the target.


Protective Advice

Defending from attackers using covert networks is not straightforward, and defensive tactics will be different based on the levels of resource and the nature of the target organisation. General advice for good cyber security practice should be followed, and some key messages can be found in the appendix of this advisory.

The following advice is specifically tailored to steps which can be taken to combat the risk of attacks coming from large, dynamic networks of compromised devices.

Further guidance for all organisations facing cyber security threats is available on the NCSC website.

This guidance should be considered alongside all applicable laws and regulations of the UK and co-sealing countries relating to the security of networks and data. It will be each organisation’s responsibility to ensure compliance with any such laws and regulations. Organisations should note that following the recommended actions set out below will not remove all risks.

All organisations

The NCSC recommends the following steps for all affected organisations to either take themselves, or ask their managed service and/or security providers to investigate for them:

  • Map and understand network edge devices, developing a clear understanding of organisational assets and what should be connecting to them.
  • Baseline normal connections, especially to corporate virtual private networks (VPNs) or other similar services.
    • Would you expect connections from consumer broadband ranges?
  • Leverage available dynamic threat feeds which include covert network infrastructure.
  • Implement multi-factor authentication for remote connections. Smaller organisations should consider creating and actioning a free NCSC Cyber Action Toolkit.

Larger or more at-risk organisations

Some more comprehensive measures may be appropriate if the risk to an organisation is high enough, to be conducted either in-house or through a security provider:

  • Apply IP address allow lists rather than deny lists for connections to corporate VPNs for remote workers.
  • Use geographic allow lists or profile incoming connections based on operating system, time zones, and/or organisation specific system configuration settings.
  • Implement zero trust policies for connections.
  • Enforce machine certificates for Secure Sockets Layer (SSL) connections.
  • Reduce the internet-facing presence of the IT estate.
  • Investigate machine learning techniques to profile normal network edge activity to detect and block anomalies. The NCSC's Cyber Essentials can help protect organisations of all sizes.

Largest or most at-risk organisations

If Advanced Persistent Threat (APT) tracking is part of an organisation’s in-house capability, or if it is part of the service provided by a security vendor, consider tracking China-nexus covert networks as APTs in their own right.

  • Active hunting – look for connections from IP addresses likely to be part of a covert network of compromised devices, for instance those hosting SOHO routers or IoT devices.
  • Track and map covert networks reported by industry or government by looking at banners and certificates.
  • Use threat reporting and threat feeds to create and implement dynamic blocklists and create alert rules to detect incoming threats.
  • Consider using NetFlow feeds to look upstream and map covert networks to find new nodes. The NCSC Cyber Assessment Framework provides guidance for organisations under the highest levels of threat, including those operating essential services, in sectors such as energy, healthcare, transport, digital infrastructure and government.

MITRE ATT&CK®

This advisory has been compiled with respect to the MITRE ATT&CK® framework, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

Tactic ID Technique Procedure
Resource Development T1584.005 Compromise Infrastructure: Botnet Botnets are used as core components of covert networks
Resource Development T1584.008 Compromise Infrastructure: Network Devices Devices are compromised and added to botnets
Resource Development T1583.003 Acquire Infrastructure: Virtual Private Server Virtual private servers (VPS) are used in covert networks, typically as on-ramps
Command and Control T1090.003 Proxy: Multi-hop Proxy Used by China-nexus cyber actors to route traffic

Appendix: Cyber Security Best Practices

In addition to the protective advice outlined in this advisory, a number of cyber security best practices will also be useful in defending against the activity described in this advisory.


Download

  • Pdf
  • 626.79 KB

Defending against China-nexus covert networks of compromised devices

Download the advisory which explains the widespread shift in TTPs towards networks of compromised infrastructure, and how to defend against it

Download & print article PDF Share Share Facebook LinkedIn X Copy Link

Published

23 April 2026

Written for

Cyber security professionals

News type

Alert

Was this article helpful?


News

23 Apr 2026

Executive Summary: Defending against China-nexus covert networks of compromised devices

Organisations should map and baseline their edge device traffic, especially VPN and remote access connections, and adopt dynamic threat feed filtering that includes known covert network indicators.
News

23 Apr 2026

International cyber agencies share fresh advice to defend against China-linked covert networks

New advisory highlights how to defend against attacker tactics believed to be used by China-linked actors to hide malicious cyber activity.
News

7 Apr 2026

APT28 exploit routers to enable DNS hijacking operations

Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and authentication tokens.

Named provisions

Introduction Covert Networks Typical Network Topology

Get daily alerts for NCSC UK News

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from NCSC-UK.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
NCSC-UK
Instrument
Guidance
Branch
Executive
Joint with
CISA FBI NSA ASD CSE BSI BND BfV NCO AIVD MIVD NCSC-NZ CCN NCSC-SE DC3
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Government agencies Technology companies Financial advisers
Industry sector
5112 Software & Technology
Activity scope
Threat intelligence Network defense Botnet mitigation
Geographic scope
United Kingdom GB

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Defense & National Security Telecommunications

Get alerts for this source

We'll email you when NCSC UK News publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!