Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Posted on January 15, 2026January 15, 2026 By CWS

Menace actors linked to Chinese language internet hosting infrastructure have established a large community of over 18,000 lively command-and-control servers throughout 48 completely different internet hosting suppliers in current months.

This widespread abuse highlights a critical challenge in how malicious infrastructure can conceal inside trusted networks and cloud providers.

Conventional risk looking strategies that concentrate on particular person IP addresses or domains typically miss the larger image as a result of attackers always change these indicators to keep away from detection.

The analysis reveals that these C2 servers make up about 84 p.c of all malicious exercise noticed inside Chinese language internet hosting environments through the three-month evaluation interval.

Host Radar features (Supply – Hunt.io)

Phishing infrastructure accounts for round 13 p.c, whereas malicious open directories and public indicators of compromise collectively symbolize lower than 4 p.c of detected threats.

This reveals that command-and-control operations dominate the risk panorama, with attackers preferring steady infrastructure that may coordinate ongoing campaigns throughout a number of targets.

Hunt.io analysts recognized this in depth infrastructure community utilizing their Host Radar platform, which mixes C2 detection, phishing identification, open listing scanning, and indicator extraction right into a single intelligence system.

Fairly than treating every malicious artifact as remoted, the platform maps these threats again to the internet hosting suppliers and community operators the place they exist. This strategy reveals long-running abuse patterns even when particular person IP addresses change often.

China Unicom emerged as the biggest host of malicious infrastructure, accounting for practically half of all noticed C2 servers with roughly 9,000 detections.

Alibaba Cloud and Tencent every hosted round 3,300 C2 servers, exhibiting that main cloud platforms are closely focused by risk actors who worth their speedy provisioning and excessive availability.

These three suppliers alone symbolize nearly all of detected malicious command-and-control infrastructure inside China.

Infrastructure Focus and Malware Distribution

The malware households working by way of this infrastructure present clear patterns of repeated framework abuse. Mozi botnet dominates with 9,427 distinctive C2 IP addresses, representing greater than half of all noticed command-and-control exercise.

The ARL framework follows with 2,878 C2 endpoints, suggesting in depth misuse of post-exploitation and red-team tooling for malicious functions.

High 10 Chinese language infrastructure suppliers by variety of detected C2 servers (Supply – Hunt.io)

Cobalt Strike seems with 1,204 detections, whereas Vshell and Mirai spherical out the highest 5 with 830 and 703 C2 servers respectively.

This focus means defenders can focus monitoring efforts on shared infrastructure patterns fairly than chasing particular person malware variants that always evolve.

The information reveals that cybercrime operations, botnet infrastructure, and state-linked espionage instruments coexist throughout the identical internet hosting environments.

Campaigns starting from commodity distant entry trojans to stylish APT operations leverage these suppliers, creating a posh risk ecosystem the place conventional indicator-based defenses wrestle to keep up effectiveness.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Active, Actors, Chinese, Hosted, Hosting, Providers, Servers, Threat

Post navigation

Previous Post: Palo Alto Networks Firewall Vulnerability Allows Unauthenticated Attackers to Trigger Denial of Service
Next Post: Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login

Related Posts

Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads Cyber Security News
Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News
New Linux EDR Evasion Tool Using io_uring Kernel Feature Cyber Security News
Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
  • Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Central Maine Healthcare Data Breach Impacts 145,000 Individuals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
  • Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Central Maine Healthcare Data Breach Impacts 145,000 Individuals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark