UK’s National Cyber Security Centre and Volt Typhoon: Chinese hackers are using everyday devices to hack UK firms, warns watchdog

UK’s National Cyber Security Centre and Volt Typhoon: Chinese hackers are using everyday devices to hack UK firms, warns watchdog

China-Linked Hackers Exploit Everyday Devices in Global Espionage Campaign

The UK’s National Cyber Security Centre (NCSC), alongside cybersecurity agencies from nine other countries including the U.S., Australia, Canada, and Germany has issued a warning about a sophisticated cyber-espionage campaign tied to China. The threat involves the hijacking of common internet-connected devices, such as Wi-Fi routers, printers, and webcams, to create covert networks (or "botnets") for surveillance and data theft.

These botnets primarily target outdated or unpatched devices, using them as launchpads for attacks while obscuring the attackers' origins. The NCSC’s CEO, Richard Horne, described China’s cyber capabilities as "eye-watering," emphasizing that Beijing’s intelligence and military agencies now operate as a "peer competitor" in cyberspace. The shift in tactics leveraging compromised consumer and small office devices marks a significant evolution in China-linked cyber operations.

The advisory highlights that these covert networks are often maintained by private Chinese firms, with one example involving a company that infected 200,000 devices worldwide. A notable group, Volt Typhoon, has been linked to infiltrations of critical U.S. infrastructure, including rail, aviation, and water systems. The NCSC warns that multiple threat actors may share a single botnet, making attribution and defense more challenging.

To mitigate risks, the NCSC recommends organizations map their IT systems including connections to consumer broadband networks enforce multi-factor authentication for remote access, and restrict external device connections. While the guidance is aimed at businesses, the widespread use of compromised household devices underscores the broader threat landscape.

Earlier this year, Google disrupted a similar "residential proxy" network, demonstrating the global scale of these operations. The NCSC’s advisory, published on Thursday, confirms that China-backed hackers continue to refine their methods, posing a persistent and evolving risk to cybersecurity.

Source: https://www.theguardian.com/technology/2026/apr/23/china-cyber-hacker-using-everyday-devices-hack-uk-firms

UK’s National Cyber Security Centre TPRM report: https://www.rankiteo.com/company/national-cyber-security-centre

Volt Typhoon TPRM report: https://www.rankiteo.com/company/national-counterintelligence-and-security-center

"id": "natnat1776947160",
"linkid": "national-counterintelligence-and-security-center, national-cyber-security-centre",
"type": "Cyber Attack",
"date": "4/2026",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'industry': ['Rail', 'Aviation', 'Water Systems'],
                        'location': 'U.S.',
                        'type': 'Critical Infrastructure'},
                       {'customers_affected': '200,000+ devices worldwide',
                        'location': 'Global',
                        'type': 'Consumer/Small Office Devices'}],
 'attack_vector': ['Exploitation of unpatched/vulnerable devices',
                   'Botnet creation'],
 'data_breach': {'data_exfiltration': 'Likely (espionage campaign)',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Surveillance data',
                                              'Infrastructure-related '
                                              'information']},
 'description': 'The UK’s National Cyber Security Centre (NCSC) and '
                'cybersecurity agencies from nine other countries issued a '
                'warning about a sophisticated cyber-espionage campaign tied '
                'to China. The threat involves hijacking common '
                'internet-connected devices (e.g., Wi-Fi routers, printers, '
                'webcams) to create covert botnets for surveillance and data '
                'theft. These botnets target outdated or unpatched devices to '
                "obscure attackers' origins and launch attacks. The campaign "
                'is linked to China’s intelligence and military agencies, with '
                'private Chinese firms maintaining the botnets. A notable '
                'group, Volt Typhoon, has infiltrated critical U.S. '
                'infrastructure, including rail, aviation, and water systems. '
                'Multiple threat actors may share a single botnet, '
                'complicating attribution and defense.',
 'impact': {'data_compromised': 'Surveillance data, sensitive infrastructure '
                                'information',
            'operational_impact': 'Compromised network integrity, covert '
                                  'surveillance capabilities',
            'systems_affected': ['Wi-Fi routers',
                                 'Printers',
                                 'Webcams',
                                 'Critical infrastructure (rail, aviation, '
                                 'water systems)']},
 'initial_access_broker': {'backdoors_established': 'Botnets',
                           'entry_point': 'Unpatched/vulnerable consumer and '
                                          'small office devices',
                           'high_value_targets': ['Critical infrastructure '
                                                  '(rail, aviation, water '
                                                  'systems)']},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'China-backed hackers are evolving tactics to exploit '
                    'everyday devices for espionage, requiring enhanced '
                    'monitoring, network segmentation, and MFA enforcement. '
                    'Attribution is challenging due to shared botnet usage.',
 'motivation': 'Espionage, Surveillance, Data Theft',
 'post_incident_analysis': {'corrective_actions': 'Enhanced monitoring, '
                                                  'network segmentation, MFA '
                                                  'enforcement, device '
                                                  'patching',
                            'root_causes': 'Exploitation of '
                                           'unpatched/vulnerable devices, lack '
                                           'of MFA, poor network segmentation'},
 'recommendations': ['Map IT systems, including consumer broadband network '
                     'connections',
                     'Enforce multi-factor authentication (MFA) for remote '
                     'access',
                     'Restrict external device connections',
                     'Patch and update all internet-connected devices',
                     'Monitor for unusual botnet activity'],
 'references': [{'source': 'UK National Cyber Security Centre (NCSC)'},
                {'source': 'Google (disruption of residential proxy network)'}],
 'response': {'communication_strategy': 'Public advisory issued by NCSC and '
                                        'partner agencies',
              'enhanced_monitoring': 'Recommended (map IT systems, enforce MFA '
                                     'for remote access)',
              'network_segmentation': 'Recommended (restrict external device '
                                      'connections)'},
 'stakeholder_advisories': 'Public advisory issued by NCSC and partner '
                           'agencies (U.S., Australia, Canada, Germany, etc.)',
 'threat_actor': ['China-linked hackers',
                  'Volt Typhoon',
                  'Private Chinese firms'],
 'title': 'China-Linked Hackers Exploit Everyday Devices in Global Espionage '
          'Campaign',
 'type': 'Cyber Espionage',
 'vulnerability_exploited': 'Outdated or unpatched consumer and small office '
                            'devices'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.