LIVE NEWSROOM · --:-- · May 22, 2026
A LIBRARY FOR SECURITY RESEARCHERS

12 Allied Agencies Warn: China-Nexus Actors Are Building Covert Botnets from Your Routers and Cameras

Post on X LinkedIn
12 Allied Agencies Warn: China-Nexus Actors Are Building Covert Botnets from Your Routers and Cameras

CISA, the UK NCSC, FBI, NSA, and nine additional allied agencies published joint advisory AA26-113A on April 23, 2026, detailing a documented shift in how China-nexus threat actors conduct cyber operations: they are no longer relying on individually procured infrastructure, and are instead weaponizing large botnets of compromised SOHO routers, IoT devices, network firewalls, and NAS systems to route espionage operations against critical infrastructure worldwide. The groups named in the advisory include Volt Typhoon, Salt Typhoon, and Flax Typhoon. If you manage network perimeter devices — routers, firewalls, cameras, NAS — and have not reviewed your exposure, this advisory is directed at you.

// 01 China-Nexus Covert Networks: What We Know So Far

The advisory describes a structural change in Chinese state-sponsored hacking operations. Rather than registering VPSes or using dedicated attack infrastructure, these actors are building what the agencies call “covert networks” — dynamic pools of compromised edge devices owned by third parties, including small businesses, home offices, and industrial operators. The devices act as relay nodes, masking the actors’ true origin and making attribution significantly harder for defenders and incident responders.

Three distinct threat clusters are highlighted:

Volt Typhoon used the KV Botnet, constructed primarily from end-of-life Cisco and NetGear routers that were no longer receiving security patches. The group used these nodes to conduct long-term, low-and-slow intrusions into U.S. critical infrastructure, including energy, water, and transportation sectors.

Flax Typhoon operated the Raptor Train botnet, which at its peak infected over 200,000 devices globally. Raptor Train was controlled by a Chinese company called Integrity Technology Group and consisted of SOHO routers, IP cameras, video recorders, firewalls, and NAS appliances. The FBI disrupted Raptor Train in a 2024 court-authorized operation, but the advisory confirms the underlying TTP — compromising consumer and business edge devices for use as relay infrastructure — has continued and expanded under multiple actors.

Salt Typhoon targeted backbone telecommunications infrastructure, using compromised telco provider equipment to establish persistent, covert access to sensitive communications.

These covert networks are used across the entire cyber kill chain: reconnaissance, malware delivery, command-and-control communication, and data exfiltration. The advisory notes that because these botnets rotate IP addresses and reuse infrastructure across multiple actors, traffic originating from them can appear indistinguishable from legitimate user activity, especially in environments that lack behavioral baselines.

The advisory is co-signed by the cybersecurity agencies of the UK, Australia, Canada, Germany, Japan, the Netherlands, New Zealand, Spain, and Sweden — a list that underscores this is not a U.S.-centric concern. Critical infrastructure operators across all of these jurisdictions are considered targets.

// 02 Why China-Nexus Covert Networks Matter

The key operational impact for defenders is attribution complexity. When an attacker’s traffic flows through a compromised residential router in your city, traditional IP-based blocklists and geolocation controls offer essentially no protection. The malicious traffic originates from a legitimate-looking IP address with no prior threat intelligence association.

This approach also degrades the value of standard network detection signatures. Traffic to and from a compromised Hikvision camera or a Netgear R7000 used as a relay looks like ordinary device traffic. Without behavioral analytics — specifically, detecting anomalous volumes, unusual external connection patterns, or unexpected protocol use from edge devices — these relay chains are difficult to spot.

For organizations with operational technology (OT) or industrial control systems (ICS) environments, the risk is compounded: OT networks often contain legacy devices that cannot be patched, creating a persistent reservoir of potential botnet candidates that are adjacent to high-value process systems.

// 03 China-Nexus Covert Networks: What You Should Do Now

  1. Audit and inventory all network edge devices. Enumerate every router, firewall, NAS device, IP camera, and IoT appliance connected to your environment. Include devices on guest networks and OT segments. If you cannot account for a device’s firmware version and manufacturer support status, treat it as a risk.

  2. Replace or isolate end-of-life network devices immediately. The KV Botnet was built almost entirely from routers no longer receiving patches. Check manufacturer support status for all edge devices. Cisco and Netgear both maintain published EoL lists. If a device is EoL and internet-facing, prioritize replacement.

  3. Apply all available firmware updates to internet-facing devices. Run this check against your device inventory: confirm current firmware, compare against the manufacturer’s latest release, and apply updates. For IoT devices without an automatic update mechanism, establish a manual patch schedule — at minimum quarterly.

  4. Change all default credentials on every network device. Flax Typhoon’s Raptor Train botnet exploited default or weak credentials as a primary initial access vector. Run a credential audit across all devices managed via web interfaces or SSH. Replace default passwords with unique, strong credentials and store them in a secrets manager.

  5. Segment IoT and OT devices onto isolated VLANs. IoT devices — cameras, recorders, smart appliances — should have no lateral access to corporate networks. Apply strict firewall rules so that these devices can only communicate with their intended destinations (e.g., a camera system server), not to arbitrary internet IPs or internal workstations.

  6. Baseline and monitor outbound traffic from edge devices. Deploy flow monitoring (NetFlow, sFlow, or equivalent) and alert on anomalous outbound connections from infrastructure devices. A router that begins establishing outbound connections to cloud storage endpoints or unknown IPs in unusual volumes is a meaningful indicator.

  7. Enable logging on all perimeter devices and forward logs to a SIEM. The advisory specifically calls out log collection as a key defensive capability. Without perimeter device logs, detecting covert relay activity is functionally impossible after the fact.

// 04 Detection and Verification Checklist

Use the following checklist to assess your current exposure and confirm your defensive posture:

  • Device inventory complete? All routers, firewalls, NAS, cameras, and IoT devices documented with model, firmware version, and EoL status.
  • EoL devices identified? Cross-reference your inventory against manufacturer EoL lists. Flag any internet-facing EoL devices as critical risk.
  • Default credentials changed? Verify via your secrets manager or direct login audit that no device retains factory default passwords.
  • Firmware current? Compare installed firmware against manufacturer’s latest release for each device.
  • Outbound traffic baselined? Do you have a flow-level baseline for what “normal” outbound traffic looks like from your edge devices?
  • Logs flowing to SIEM? Confirm that syslog or equivalent is configured and actively forwarding from all perimeter devices.
  • IoT/OT segmented? Verify VLAN assignments and firewall rules block lateral movement from IoT/OT segments.
  • MFA on remote access? Confirm that all VPN and remote management interfaces require MFA.

Sources: CISA AA26-113A, CyberScoop Coverage, Security Boulevard, Industrial Cyber

For any query contact us at contact@cipherssecurity.com

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft Next cPanel CVE-2026-41940 Was Actively Exploited for 30 Days Before Patch

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top
    Ad