Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Google disrupts proxy network used by 550+ threat groups
    Cybersecurity

    Google disrupts proxy network used by 550+ threat groups

    adminBy adminJanuary 29, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Google disrupts proxy network used by 550+ threat groups
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Google has disrupted Ipidea, a massive residential proxy network consisting of user devices that are being used as the last-mile link in cyberattack chains.

    “In a single seven day period in January 2026, GTIG observed over 550 individual threat groups that we track utilizing IP addresses tracked as Ipidea exit nodes to obfuscate their activities, including groups from China, DPRK, Iran and Russia. The activities included access to victim SaaS environments, on-premises infrastructure, and password spray attacks,” Google Threat Intelligence Group said on Thursday.

    Millions of home IPs for hire

    Residential proxy networks are collections of proxy servers that route internet traffic through real residential IP addresses, making it look like it’s coming from a regular household connection somewhere in the world.

    “A robust residential proxy network requires the control of millions of residential IP addresses to sell to customers for use,” GTIG explained.

    “To do this, residential proxy network operators need code running on consumer devices to enroll them into the network as exit nodes. These devices are either pre-loaded with proxy software or are joined to the proxy network when users unknowingly download trojanized applications with embedded proxy code. Some users may knowingly install this software on their devices, lured by the promise of ‘monetizing’ their spare bandwidth. When the device is joined to the proxy network, the proxy provider sells access to the infected device’s network bandwidth (and use of its IP address) to their customers.”

    Residential proxies have legal uses when used responsibly. For example, they can be used for mraket research, price comparison, fraud verification, app testing, SEO monitoring, cybersecurity research, etc.

    But, they are also used by fraudsters and other criminals for credential stuffing and account abuse, data scraping, ad fraud, ticket scalping, as well as for malware C2 obfuscation, phishing campaigns, evading detection and IP blacklists, and so on.

    IP addresses in the US, Canada, and Europe are particularly desirable, Google’s threat researchers noted.

    Disturping the Ipidea proxy network

    According to Google, the Ipidea proxy network is operated by a Chinese company of the same name, which controls a number of other ostensibly independent proxy and VPN brands like 922 Proxy, 360 Proxy, Luna Proxy, Galleon VPN and Radish VPN.

    (Previous research by Sekoia found that the residential proxy market is very opaque, and its fragmentation an illusion.)

    Google crippled the proxy network by taking down C2 domains for controlling devices and proxy traffic, as well as domains used to market proxy software and the Ipidea software development kits (SDKs).

    The company also pinpointed over 600 seemingly benign Android apps that use the Ipidea SDKs.

    “To safeguard the Android ecosystem, we enforced our platform policies against trojanizing software, ensuring Google Play Protect on certified Android devices with Google Play services automatically warns users and removes applications known to incorporate Ipidae software development kits (SDKs), and blocks any future install attempts,” GTIG announced.

    Ipidea proxy network disrupted

    Ipidea’s infrastructure model is a two-tier system (Source: Google Threat Intelligence Group)

    “We believe our actions have caused significant degradation of Ipidea’s proxy network and business operations, reducing the available pool of devices for the proxy operators by millions. Because proxy operators share pools of devices using reseller agreements, we believe these actions may have downstream impact across affiliated entities,” the threat researchers added.

    Google also shared information about Ipidea’s SDKs and proxy software with platform providers, law enforcement, and research firms, so they can take additional action to limit their distribution and the harm that may arise from malicious use of the network.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    disrupts Google groups Network proxy threat
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article9 Best SEO Content Writing Tools We Like in 2026
    Next Article This OS is a middle finger to big tech. [Video]
    admin
    • Website

    Related Posts

    Quantum-Resistant Data Diode Secures Data on Edge Devices

    March 3, 2026

    AI Agents: The Next Wave Identity Dark Matter

    March 3, 2026

    New Defender deployment tool streamlines Windows device onboarding with single executable

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How to Prevent Your Smartwatch Band From Irritating Your Skin

    March 3, 2026

    Quantum-Resistant Data Diode Secures Data on Edge Devices

    March 3, 2026

    I ditched my gas generator for battery backup, and I’m never looking back

    March 3, 2026

    AI Agents: The Next Wave Identity Dark Matter

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (577)
    • Privacy & Online Earning (81)
    • SEO & Digital Marketing (360)
    • Tech Tools & Mobile / Apps (714)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How to Prevent Your Smartwatch Band From Irritating Your Skin

    March 3, 2026

    Quantum-Resistant Data Diode Secures Data on Edge Devices

    March 3, 2026

    I ditched my gas generator for battery backup, and I’m never looking back

    March 3, 2026
    Most Popular
    • How to Prevent Your Smartwatch Band From Irritating Your Skin
    • Quantum-Resistant Data Diode Secures Data on Edge Devices
    • I ditched my gas generator for battery backup, and I’m never looking back
    • AI Agents: The Next Wave Identity Dark Matter
    • 9 Best Rewards Checking Accounts of March 2026
    • 5x the Pages, 70x the Citations, 1615x the Traffic
    • I stopped using my Kindle after setting up this gorgeous self-hosted book server
    • New Defender deployment tool streamlines Windows device onboarding with single executable
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.