<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Video Recorders — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/video-recorders/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 11:22:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/video-recorders/feed.xml" rel="self" type="application/rss+xml"/><item><title>China-Nexus Cyber Actors Using Covert Networks of Compromised Devices</title><link>https://feed.craftedsignal.io/briefs/2026-04-china-nexus-covert-networks/</link><pubDate>Thu, 23 Apr 2026 11:22:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-china-nexus-covert-networks/</guid><description>China-nexus cyber actors are increasingly using large-scale networks of compromised devices, including SOHO routers and IoT devices, to obscure the origin of their attacks and conduct various malicious activities, from reconnaissance to data exfiltration.</description><content:encoded><![CDATA[<p>A joint advisory highlights a significant shift in tactics employed by China-nexus cyber actors. They are moving away from using individually procured infrastructure and instead leveraging large-scale, externally provisioned networks of compromised devices. These &ldquo;covert networks&rdquo; primarily consist of Small Office Home Office (SOHO) routers, Internet of Things (IoT) devices, and smart devices, but can include any vulnerable device that can be exploited at scale. These networks are used for various purposes, including disguising the origin of malicious activity, scanning networks, delivering malware, communicating with compromised systems, exfiltrating stolen data, and conducting general deniable internet browsing to research new TTPs and victim profiles. These networks are constantly updated and could be used by multiple actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: China-nexus actors exploit vulnerabilities in SOHO routers, IoT devices (web cameras, video recorders), firewalls, and NAS devices.</li>
<li>Botnet Establishment: Compromised devices are incorporated into a covert network (botnet), often controlled by Chinese information security companies.</li>
<li>Reconnaissance: The actors use the botnet to scan target networks, gathering information about potential vulnerabilities and attack surfaces.</li>
<li>Exploitation: Leveraging the compromised network to mask their origin, the actors exploit identified vulnerabilities in target systems.</li>
<li>Malware Delivery: The covert network is used to deliver malware payloads to compromised systems within the target network.</li>
<li>Command and Control: The actors establish command and control (C2) channels through the compromised network to remotely control the malware and maintain access.</li>
<li>Data Exfiltration: Sensitive data is exfiltrated from the compromised network through the covert network, making attribution difficult.</li>
<li>Persistence: The actors maintain persistence on compromised systems to ensure continued access and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised networks can lead to the exposure of sensitive data, disruption of critical services, and financial losses. The use of covert networks makes attribution difficult, allowing attackers to operate with impunity. The advisory notes that Volt Typhoon has used these techniques to pre-position on critical national infrastructure. The widespread nature of the networks, comprising potentially hundreds of thousands of endpoints, makes traditional network defense strategies like static IP blocklists less effective. In 2024, one such network, Raptor Train, infected over 200,000 devices worldwide.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement robust patch management practices to keep SOHO routers, IoT devices, and other network devices up-to-date with the latest security patches (reference: Overview).</li>
<li>Strengthen network perimeter security by implementing intrusion detection and prevention systems (IDPS) to identify and block malicious traffic originating from suspicious or known compromised IP addresses (reference: Attack Chain).</li>
<li>Monitor network traffic for unusual patterns and anomalies that may indicate the presence of a compromised device or covert network activity (reference: Attack Chain).</li>
<li>Deploy the Sigma rule &ldquo;Detect Outbound Connection to Known SOHO Devices&rdquo; to identify potential compromised devices on your network (reference: rules).</li>
<li>Segment networks to limit the potential impact of a compromised device or network segment (reference: Protective Advice).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>covert-network</category><category>botnet</category><category>china-nexus</category><category>compromised-devices</category></item></channel></rss>