Intro: The Core Shift
China-linked threat actors are no longer just targeting your infrastructure—they are using it as a weapon. A joint advisory from 10 countries, led by the UK NCSC and including the US, Australia, and Japan, reveals that a majority of China-nexus cyber groups are systematically compromising routers and IoT devices worldwide to build covert proxy networks. These botnets are then used to launch further intrusions, steal sensitive data, and disrupt operations. The scale is staggering: in 2024 alone, the Raptor Train network infected over 200,000 devices. This is not a new tactic, but as the advisory states, it is now being used strategically and at scale. For executives, this means your organization’s edge devices are a direct liability—and the threat is accelerating.
Analysis: Strategic Consequences
How Botnets Enable State-Sponsored Attacks
The advisory identifies multiple China-linked groups—including Flax Typhoon, Volt Typhoon, and others—that rely on compromised routers and IoT gear. For example, Volt Typhoon built its KV Botnet using end-of-life Cisco and Netgear routers. These devices are often unpatched and unmonitored, making them ideal for covert operations. The botnets serve as anonymizing proxies, allowing attackers to mask their origins and evade attribution. This infrastructure is shared across groups: sometimes multiple China-linked crews use the same covert network, creating a tangled web of malicious activity.
Who Gains? Who Loses?
Winners: Cybersecurity vendors offering threat intelligence and botnet detection services will see surging demand. Government agencies like the FBI and NCSC gain credibility from successful disruptions (e.g., SocksEscort takedown). Losers: Router manufacturers like Cisco and Netgear face reputational damage and potential liability as their end-of-life devices become weapons. Organizations with unpatched IoT devices are direct targets—they risk operational disruption, data theft, and being used as launchpads for attacks on others.
Second-Order Effects
The proliferation of these botnets will accelerate regulatory pressure for IoT security standards. Expect mandates for device lifecycle management, secure-by-default configurations, and labeling requirements. Financially motivated criminals will also exploit similar techniques, as seen with the SocksEscort residential proxy service, which compromised hundreds of thousands of routers for fraud. The line between state-sponsored and criminal activity is blurring.
Market / Industry Impact
The cybersecurity market will shift toward zero-trust architectures and network segmentation. Organizations will need to invest in continuous monitoring of edge devices, dynamic threat feed filtering, and machine learning-based anomaly detection. The advisory specifically recommends mapping and baselining edge device traffic, especially VPN and remote access connections. This will drive spending on network visibility tools and managed detection services.
Executive Action
- Immediately inventory all edge devices (routers, IoT, NAS) and ensure they are patched or replaced if end-of-life.
- Implement multi-factor authentication and zero-trust controls for remote access; use IP allow lists and machine certificate verification.
- Deploy dynamic threat feed filtering that includes known covert network indicators, and consider proactive hunting for suspicious traffic.
Why This Matters
Your organization’s routers and IoT devices are being turned into weapons against you and others. The 10-country warning is a clear signal that the threat is systemic and escalating. Without immediate action, you risk becoming part of a botnet that enables espionage, ransomware, or disruption—with legal and reputational consequences.
Final Take
This is not a future threat—it is happening now. The strategic use of covert networks by China-linked groups represents a fundamental shift in cyber operations. Defenders must treat every edge device as a potential entry point and adopt a zero-trust mindset. The window to act is closing.
Rate the Intelligence Signal
Intelligence FAQ
End-of-life routers (Cisco, Netgear), SOHO routers, IP cameras, and NAS devices are prime targets due to unpatched vulnerabilities.
Map all edge devices, enforce MFA for remote access, and deploy dynamic threat feed filtering with known botnet indicators.


