Cybersecurity agencies from ten nations, led by the U.S. National Security Agency (NSA), CISA, and FBI, have released a joint advisory detailing a strategic shift by China-nexus threat actors. These state-sponsored groups are now extensively using large-scale, dynamically managed botnets of compromised edge devices—such as SOHO routers, firewalls, and IoT devices—to create 'covert networks'. This infrastructure provides a layer of obfuscation, allowing multiple APT groups to launch attacks, conduct espionage, and exfiltrate data with a high degree of anonymity and deniability. The advisory highlights that this method is a low-cost, effective way to hide their operations within the noise of legitimate internet traffic. The report explicitly connects the KV Botnet, comprised of vulnerable Cisco and NetGear routers, to the Volt Typhoon group and another network, Raptor Train, to the Flax Typhoon group. The agencies warn that static defenses like IP blocklists are insufficient and recommend urgent hardening of network edge devices.
Threat Actors: Multiple China-nexus APT groups, including Volt Typhoon (also known as Bronze Silhouette) and Flax Typhoon (also known as Ethereal Panda). Infrastructure: Covert networks built from massive botnets of compromised SOHO routers, firewalls, and IoT devices. Specific examples include the KV Botnet and Raptor Train. Tactic: Using the compromised devices as proxies and relays to obscure the true origin of their attacks. This allows for shared infrastructure among different APT groups, complicating attribution. Objective: Cyber espionage, data exfiltration, and pre-positioning on critical infrastructure networks for potential future disruptive or destructive attacks.
The advisory emphasizes that this is not the work of a single threat actor but a systemic, state-supported strategy. The report notes evidence that Chinese information security companies, such as Integrity Technology Group, are involved in building and maintaining these botnets for state use. The dynamic nature of the botnets, where new devices are constantly added as old ones are cleaned or patched, presents a significant challenge for defenders who can no longer rely on static IOCs.
The core of this threat is the abuse of legitimate, albeit vulnerable, internet-facing devices. The threat actors exploit known or zero-day vulnerabilities in these devices to gain control and incorporate them into their botnet.
T1090.002 - External Proxy: The primary technique is using the compromised SOHO routers as a chain of external proxies to tunnel malicious traffic, making it appear to originate from a residential or small business IP address.T1190 - Exploit Public-Facing Application: Actors exploit vulnerabilities in routers and other edge devices to gain initial access to them.T1071.001 - Web Protocols: C2 and data exfiltration traffic is often tunneled over standard web protocols like HTTP/HTTPS to blend in with normal traffic.T1583.006 - Web Services: The actors acquire a vast network of vulnerable devices to build their operational infrastructure.The advisory states that Volt Typhoon used the KV Botnet to target U.S. critical infrastructure, indicating a focus on high-value targets. The Raptor Train network, which infected over 200,000 devices, was linked to Flax Typhoon's operations against Taiwan.
The strategic use of these covert networks significantly raises the operational security and deniability of China-nexus actors. For defenders, it means that malicious traffic can originate from seemingly benign IP addresses anywhere in the world, including within their own country. This renders geolocation-based blocking and simple IP reputation feeds largely ineffective. The primary impact is an increased risk of undetected espionage and network intrusion, particularly against critical infrastructure, government, and defense sectors. By pre-positioning on these networks, the actors gain the ability to launch disruptive attacks at a time of their choosing, posing a direct threat to national security and economic stability.
No specific IP addresses, domains, or file hashes were provided in the summary articles for direct use as IOCs, as the advisory focuses on the dynamic nature of the threat.
Security teams should focus on behavioral and traffic analysis rather than static IOCs.
sshd, dropbear, telnetdD3-OTF: Outbound Traffic Filtering). Deny all traffic by default and only allow connections to known-good destinations on required ports/protocols.M1051 - Update Software).M1030 - Network Segmentation) to prevent compromised edge devices from being able to access critical internal assets.Regularly patch internet-facing devices like routers and firewalls to close the vulnerabilities used for initial compromise.
Mapped D3FEND Techniques:
Segment the network to prevent compromised edge devices from accessing critical internal systems.
Mapped D3FEND Techniques:
Implement strict egress filtering to block unexpected outbound connections from edge devices.
Mapped D3FEND Techniques:
To counter the threat of SOHO router botnets, organizations must aggressively pursue platform hardening for all network edge devices, including those used by remote workers. This starts with changing all default credentials immediately upon deployment. Remote management interfaces (web, SSH, Telnet) should be disabled from the WAN side entirely. If remote access is required, it must be restricted by source IP to a trusted management network. Furthermore, disable unused and insecure services like UPnP, WPS, and Telnet. For corporate-managed devices, create a standard hardened configuration baseline and use configuration management tools to audit and enforce it. This proactive hardening denies threat actors like Volt Typhoon the low-hanging fruit they rely on to build their covert networks, significantly reducing the organization's exposure.
Given that threat actors are using legitimate, compromised devices for C2, static IOCs are ineffective. The primary detection strategy must be Network Traffic Analysis (NTA). Deploy NTA tools or leverage NetFlow/IPFIX data to establish a baseline of normal network behavior for all edge devices. The key is to hunt for anomalies. For example, a SOHO router should never initiate a connection to an internal database server or a domain controller. Configure alerts for such policy violations. Monitor for traffic to known dynamic DNS providers or unusual ports from these devices. Analyze the volume and timing of data flows; a compromised router exfiltrating data may show sustained outbound traffic at odd hours. This behavioral approach is the most effective way to identify a compromised device being used as a pivot point within a covert network, allowing for rapid isolation and investigation.
Implementing a default-deny outbound traffic filtering policy is a powerful mitigation against these covert networks. At the network perimeter, configure firewalls to block all outbound traffic except for that which is explicitly required for business operations. This is particularly effective for server segments where outbound communication patterns are predictable. For user segments, this can be more challenging, but at a minimum, restrict outbound traffic to standard web ports (80, 443) and block traffic to known malicious or high-risk countries. This technique disrupts the threat actor's ability to establish C2 channels and exfiltrate data. Even if a SOHO router is compromised, strict egress filtering can prevent it from connecting back to the attacker's infrastructure or being used to pivot further into the network, effectively neutralizing its utility to the botnet.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats