Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Compromised everyday devices power Chinese cyber espionage operations
    Cybersecurity

    Compromised everyday devices power Chinese cyber espionage operations

    adminBy adminApril 25, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Compromised everyday devices power Chinese cyber espionage operations
    Share
    Facebook Twitter LinkedIn Pinterest Email

    China-linked threat actors have shifted from individually procured infrastructure to large-scale covert networks, botnets built from compromised routers and other edge devices, the National Cyber Security Centre (NCSC) warns.

    China covert networks advisory

    To help organizations address this threat, the NCSC, together with the Cyber League and partner agencies, has issued an advisory.

    The advisory includes guidance for organizations of all sizes, urging them to map and baseline traffic from edge devices, particularly VPN and remote access connections, and to adopt dynamic threat feed filtering that incorporates known covert network indicators.

    The NCSC believes that most China-nexus groups rely on these so-called covert networks. Multiple networks have been created and are continuously updated, and a single network may be used by several groups at the same time. These networks are largely built from small office/home office (SOHO) routers, along with IoT and smart devices.

    “The number of covert networks used by China-nexus cyber actors is large, with new networks regularly developed and deployed. The existing covert networks change too, either because of defensive or legal action, or simply as a result of software updates and new exploits being used to target different technologies for incorporation into the network,” NCSC said.

    According to the agencies, these networks are created and maintained externally by Chinese information security companies.

    In September 2024, the NCSC, alongside international partners, called out China-based Integrity Technology Group for controlling and managing a botnet used by Flax Typhoon, a Chinese state-sponsored threat actor.

    The company was later sanctioned by the EU Council for its role in cyberattacks that compromised more than 65,000 devices across six EU member states.

    “Our new joint advisory consolidates insights and proactive advice from across the international cyber security community to help network defenders combat the use of covert networks,” noted Paul Chichester, NCSC Director of Operations.

    “In recent years, we have seen a deliberate shift in cyber groups based in China utilising these networks to hide their malicious activity in an attempt to avoid accountability,” added Chichester.

    “Defending against attackers using covert networks is not straightforward,” the NCSC stated, adding that defensive tactics will vary depending on the level of resources and the nature of the target organization.

    Chinese Compromised Cyber Devices Espionage everyday Operations Power
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy Great Content Is No Longer Enough & What Beats It In AI Search
    Next Article Google Clock 8.8 APK Download by Google LLC
    admin
    • Website

    Related Posts

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    April 25, 2026

    Windows Update gets new controls to reduce forced restarts

    April 25, 2026

    Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    5 things you never thought a $5 ESP32 could do

    April 25, 2026

    Why GEO is a reputation problem

    April 25, 2026

    Your SSD is slowing down, and Windows has been quietly hiding the fix

    April 25, 2026

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,505)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (924)
    • Tech Tools & Mobile / Apps (1,790)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    5 things you never thought a $5 ESP32 could do

    April 25, 2026

    Why GEO is a reputation problem

    April 25, 2026

    Your SSD is slowing down, and Windows has been quietly hiding the fix

    April 25, 2026
    Most Popular
    • 5 things you never thought a $5 ESP32 could do
    • Why GEO is a reputation problem
    • Your SSD is slowing down, and Windows has been quietly hiding the fix
    • Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
    • Google Clock 8.8 APK Download by Google LLC
    • Compromised everyday devices power Chinese cyber espionage operations
    • Why Great Content Is No Longer Enough & What Beats It In AI Search
    • Windows Update gets new controls to reduce forced restarts
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.