Cyber Security Blog

Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.

Defending Against the China Nexus: Why Blocking Malicious IPs Is No Longer Enough

You’ve invested in threat feeds, deny lists, and perimeter monitoring. Your team reviews alerts, your VPN is locked down, and you block known bad actors at the firewall. So why have 16 national cyber agencies, including the NCSC, FBI, NSA, and CISA, just published a joint advisory warning that this approach is becoming less reliable?

The answer lies in a quiet but significant shift in how state-sponsored attackers are operating, and it has implications for organisations of every size.

The Playbook Has Changed

For years, China-nexus cyber actors built or procured their own attack infrastructure. Dedicated servers, VPNs, and hosting arrangements that, once identified, could be blocked and tracked.

That’s no longer how they operate.

The NCSC now assesses that the majority of China-nexus threat actors have moved to using large-scale networks of compromised devices, routing their activity through other people’s hardware to obscure where attacks are coming from. These networks are built from devices that are already inside legitimate networks:

One network, known as Raptor Train, infected more than 200,000 devices worldwide. It was controlled and managed by a Chinese information security company, and used by the group known as Flax Typhoon to conduct cyber espionage.

A separate network, the KV Botnet, was used by Volt Typhoon to pre-position offensive capabilities inside critical national infrastructure.

These are not opportunistic attacks. They are deliberate, strategic, and operating at scale.

If your organisation operates in critical national infrastructure, financial services, or government, you are in the target set for both.

Why Your Block List Can’t Keep Up

The traditional response to a known threat actor is to block the IP addresses they use. It’s simple, auditable, and it works, when the attacker is using a fixed or predictable set of infrastructure.

Covert networks break that model entirely.

When an attack can arrive from any one of hundreds of thousands of constantly rotating IP addresses, spread across compromised consumer routers and IoT devices in dozens of countries, a static deny list becomes largely ineffective. The cyber security industry has a name for this: IOC Extinction. As old devices are patched, taken offline, or replaced, new ones are recruited into the network. The pool of potential source addresses never shrinks, it just changes.

This is compounded by the fact that some of these networks also carry legitimate traffic, making it harder still to separate malicious connections from normal ones based on IP address alone.

If your current network defence relies primarily on blocking known bad IPs, this advisory is a direct signal that your detection strategy needs to evolve alongside the threat.

The Devices Being Used Are Ones You Recognise

This is not abstract infrastructure sitting in a data centre somewhere. The KV Botnet was built largely from end-of-life Cisco and NetGear routers, hardware that was still connected, still routing traffic, but no longer receiving security patches from its manufacturer.

That’s the common thread across almost every covert network documented in this advisory: not sophisticated zero-days against hardened targets, but outdated, unpatched, or simply forgotten devices on the network perimeter.

End-of-life hardware is not just a compliance concern. In this threat environment it is a potential recruitment point into a covert attack network, and one your current monitoring may not flag. If you haven’t recently [scanned for vulnerable infrastructure] on your network edge, that’s a gap worth closing sooner rather than later.

What To Do, Depending on Where You Are

The NCSC advisory structures its protective advice across three levels, and it’s worth being honest about which one applies to your organisation.

For all organisations, the starting point is visibility:

For larger or higher-risk organisations, the shift from deny lists to allow lists is worth serious consideration:

For organisations facing the highest levels of threat, including those operating essential services, treat China-nexus covert networks as APTs in their own right:

The Wider Picture

This advisory carries unusual weight. Sixteen agencies across the UK, US, Australia, Canada, Germany, Japan, the Netherlands, New Zealand, Spain, and Sweden have aligned on a single document. That level of coordination reflects a shared assessment that the threat is significant, consistent, and not going away.

The good news is that the defensive steps are well-defined. This is not a situation where the industry is scrambling to understand what’s happening. The question worth asking now is whether your current defences would tell you if a covert network was already using your perimeter to route traffic.

If you want to understand your current exposure to covert network traffic, or identify vulnerable devices on your network edge before someone else does, we can help you scan for vulnerable infrastructure and penetration test your network edge to see what’s actually visible from the outside.

Ready to achieve your security goals? We’re at your service.

Whether you are a CISO, an IT Director or a business owner, Equilibrium has the
expertise to help you shape and deliver your security strategy.

About the author

Jen is a marketing professional who supports the marketing strategy across the digital mix, with a strong focus on content creation and campaign delivery. She develops clear, customer-focused content that helps organisations understand cyber security risks and best practice. Jen enjoys keeping up with developments across the cyber security landscape to ensure marketing activity remains relevant and valuable.
Jen Goulbourne
Marketing Executive

Latest posts