Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Google Cuts Millions of Devices from Malicious Proxy Network
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Google Cuts Millions of Devices from Malicious Proxy Network

Highlights

  • Google disrupted IPIDEA’s proxy network, removing millions of compromised devices.

  • The operation impacted about 40% of proxies but left many still active.

  • Ongoing vigilance and collaboration are needed to counter threats from these networks.

Ethan Moreno
Last updated: 30 January, 2026 - 6:49 pm 6:49 pm
Ethan Moreno 3 hours ago
Share
SHARE

Contents
How Was IPIDEA’s Infrastructure Targeted?What Role Did SDKs and App Developers Play?Could Further Disruption Be On the Horizon?

A recent crackdown by Google has led to a significant reduction in the number of devices accessible to cybercriminals via the IPIDEA residential proxy network, based in China. This intervention, accomplished through a mix of legal action and intelligence sharing, has effectively limited the capacity of threat actors and data thieves to conceal their activities using hijacked consumer bandwidth. Collaborating with companies such as Cloudflare and Lumen’s Black Lotus Labs, Google has shifted the dynamics within cybercriminal networks, making it more challenging for them to exploit compromised devices at scale. This latest move reflects growing pressure from the security community to dismantle the infrastructure supporting online threats before criminals can regroup.

Previous efforts to combat malicious proxy networks often led to only temporary setbacks for threat actors, with networks like IPIDEA bouncing back and continuing to facilitate botnets and large-scale cyberattacks. Earlier disruptions focused mostly on individual components, allowing operators to reconstitute their systems quickly. The current operation is broader in scope and has created more noticeable gaps in IPIDEA’s operational ability, based on technical and observational data now available. Compared to earlier attempts, the scale of impacted devices and domains points to a more sustained effect, though ongoing vigilance is necessary as criminals adapt to new defensive measures.

How Was IPIDEA’s Infrastructure Targeted?

Google’s Threat Intelligence Group collaborated with partners to dismantle portions of IPIDEA’s domain infrastructure, directly affecting the proxy network’s command and control. The operation resulted in an estimated 40% decrease in proxy devices, marking a significant curtailment of available assets for malicious use. Cloudflare and Lumen’s Black Lotus Labs contributed research and tracking capabilities during this process. However, researchers acknowledge gaps in visibility regarding the network’s full scale.

What Role Did SDKs and App Developers Play?

Analysis revealed that IPIDEA’s reach was bolstered by embedding its software development kits (SDKs) into third-party applications. Developers received payments based on download rates, with these SDKs turning user devices into endpoints for the proxy network.

“These SDKs are the key to any residential proxy network—the software they get embedded into provides the network operators with the millions of devices they need to maintain a healthy residential proxy network,”

Google stated in its report. This practice often escaped users’ notice, allowing service providers to quietly expand proxy capabilities using consumer devices.

Could Further Disruption Be On the Horizon?

Despite achieving a significant reduction in active proxies, up to 5 million bots reportedly remain under IPIDEA’s control. Security specialists emphasize that the residential proxy industry is rapidly expanding, much of it driven by criminal use.

“The residential proxy industry appears to be rapidly expanding, and GTIG’s research indicates that the vast majority of its growth is fueled by malicious use,”

observed Charley Snyder, a senior manager at GTIG. The ongoing challenge lies in contending with a complex array of brands and entities that can reconstitute infrastructure even after major takedowns.

Security analysts continue to identify methods by which cybercriminals embed proxy malware into everyday apps and leverage vast residential proxy networks for cyber espionage, botnet activity, and large-scale fraud. Of note, over 550 threat groups from regions including China, North Korea, Iran, and Russia were recently found using IPIDEA’s resources to target various cloud environments and on-premises infrastructure. Recent interventions are designed to hinder these capabilities by “imposing significant costs on the ecosystem in a way that can’t easily or quickly be regenerated,” according to Snyder. Still, the infrastructure’s dependence on shared and often anonymous components leaves room for rapid adaptability.

Efforts to combat residential proxy exploitation highlight the persistent back-and-forth between defenders and threat actors. The scale and sophistication of networks like IPIDEA mean that compromising their operations requires coordinated, continuous action across tech, security, and legal domains. While this disruption represents a substantial setback for cybercriminals leveraging residential proxies, device owners and industry stakeholders must remain attentive to how proxy software finds its way into apps. Keeping software up to date, limiting permissions for unknown applications, and verifying sources before installation can help reduce the likelihood of devices being conscripted into such networks. As the technological environment evolves, maintaining pressure on infrastructure rather than just individual actors remains a critical strategy for defenders.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Secret Service Official Urges Stricter Controls on Domain Registration

North Korean Cyber Group Splits to Target Multiple Sectors

Hackers Bypass FortiCloud SSO, Target Fortinet Security Products

Cybercriminals and State Groups Target WinRAR Vulnerability, Google Confirms

Experts Question CISA’s Quantum-Resistant Tech Guidance for Agencies

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article New York Robotics Unites 160 Startups to Boost City’s Tech Scene
Next Article Tesla Tests Cybercab Units and Sparks Debate on Charging Features

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Tests Cybercab Units and Sparks Debate on Charging Features
Electric Vehicle
New York Robotics Unites 160 Startups to Boost City’s Tech Scene
AI
Tesla Builds 4680 Battery Cells Using New Dry-Electrode Method
Electric Vehicle
Experts Share Insights as ASRS Adoption Picks Up Pace
Robotics
China’s AI Giants Drive Competition in Agentic Commerce Integration
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?