Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Google Disrupts Extensive Residential Proxy Networks
News

Google Disrupts Extensive Residential Proxy Networks

Team-CWDBy Team-CWDJanuary 29, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google and several industry partners have taken coordinated action to disrupt what is believed to be one of the largest residential proxy networks globally, known as IPIDEA.

The network operates largely out of public view but has become a key enabler for cybercrime, espionage and information operations.

Residential proxy services allow customers to route traffic through IP addresses assigned to households and small businesses. This approach helps malicious actors hide their activity within normal consumer traffic, creating serious challenges for network defenders.

Legal Action and Platform Safeguards

The disruption was led by Google Threat Intelligence Group (GTIG) and combined legal measures with technical enforcement.

In a new analysis published on Wednesday, Google said it pursued court action to take down domains used to command infected devices and manage proxy traffic. At the same time, it shared intelligence on IPIDEA software development kits with platform providers, law enforcement and security researchers to support coordinated action.

On the Android platform, Google expanded existing protections. Google Play Protect now alerts users, removes applications known to include IPIDEA SDKs and blocks future installation attempts on certified devices.

Read more on residential proxy networks: Criminal Proxy Network Infects Thousands of IoT Devices

Google said these efforts significantly degraded IPIDEA operations, reducing the pool of available proxy devices by millions. Because proxy providers often rely on shared infrastructure through reseller agreements, the impact is expected to extend to affiliated services.

Global Abuse and Consumer Risk

IPIDEA has been repeatedly linked to large-scale malicious activity. Its SDKs were used to enroll devices into several botnets, including BadBox 2.0, Aisuru and Kimwolf, while its proxy services were leveraged to control those botnets and obscure follow-on attacks.

During a single seven-day period this month, Google observed more than 550 tracked threat groups using IP addresses associated with IPIDEA exit nodes. These groups included actors linked to China, DPRK, Iran and Russia, and their activity ranged from accessing victim software-as-a-service (SaaS) environments to conducting password spray attacks.

Google’s analysis also found that numerous proxy and VPN brands, marketed as separate businesses, were controlled by the same actors behind IPIDEA. Several SDKs promoted as app monetization tools quietly turned user devices into proxy exit nodes once embedded.

Beyond enabling cyber operations, residential proxies pose direct risks to consumers. Devices can be flagged for abuse, expose home networks to external traffic and introduce new security vulnerabilities. 

Google urged greater transparency around claims of ethical sourcing, stronger scrutiny of monetization SDKs by developers and continued industry cooperation to limit the growth of what it described as a rapidly expanding grey market.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCritical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
Next Article New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

Don’t let “back to school” become “back to bullying”

September 11, 2025

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.