Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Posted on January 15, 2026January 15, 2026 By CWS

Menace actors linked to Chinese language internet hosting infrastructure have established a large community of over 18,000 lively command-and-control servers throughout 48 completely different internet hosting suppliers in current months.

This widespread abuse highlights a critical challenge in how malicious infrastructure can conceal inside trusted networks and cloud providers.

Conventional risk looking strategies that concentrate on particular person IP addresses or domains typically miss the larger image as a result of attackers always change these indicators to keep away from detection.

The analysis reveals that these C2 servers make up about 84 p.c of all malicious exercise noticed inside Chinese language internet hosting environments through the three-month evaluation interval.

Host Radar features (Supply – Hunt.io)

Phishing infrastructure accounts for round 13 p.c, whereas malicious open directories and public indicators of compromise collectively symbolize lower than 4 p.c of detected threats.

This reveals that command-and-control operations dominate the risk panorama, with attackers preferring steady infrastructure that may coordinate ongoing campaigns throughout a number of targets.

Hunt.io analysts recognized this in depth infrastructure community utilizing their Host Radar platform, which mixes C2 detection, phishing identification, open listing scanning, and indicator extraction right into a single intelligence system.

Fairly than treating every malicious artifact as remoted, the platform maps these threats again to the internet hosting suppliers and community operators the place they exist. This strategy reveals long-running abuse patterns even when particular person IP addresses change often.

China Unicom emerged as the biggest host of malicious infrastructure, accounting for practically half of all noticed C2 servers with roughly 9,000 detections.

Alibaba Cloud and Tencent every hosted round 3,300 C2 servers, exhibiting that main cloud platforms are closely focused by risk actors who worth their speedy provisioning and excessive availability.

These three suppliers alone symbolize nearly all of detected malicious command-and-control infrastructure inside China.

Infrastructure Focus and Malware Distribution

The malware households working by way of this infrastructure present clear patterns of repeated framework abuse. Mozi botnet dominates with 9,427 distinctive C2 IP addresses, representing greater than half of all noticed command-and-control exercise.

The ARL framework follows with 2,878 C2 endpoints, suggesting in depth misuse of post-exploitation and red-team tooling for malicious functions.

High 10 Chinese language infrastructure suppliers by variety of detected C2 servers (Supply – Hunt.io)

Cobalt Strike seems with 1,204 detections, whereas Vshell and Mirai spherical out the highest 5 with 830 and 703 C2 servers respectively.

This focus means defenders can focus monitoring efforts on shared infrastructure patterns fairly than chasing particular person malware variants that always evolve.

The information reveals that cybercrime operations, botnet infrastructure, and state-linked espionage instruments coexist throughout the identical internet hosting environments.

Campaigns starting from commodity distant entry trojans to stylish APT operations leverage these suppliers, creating a posh risk ecosystem the place conventional indicator-based defenses wrestle to keep up effectiveness.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Active, Actors, Chinese, Hosted, Hosting, Providers, Servers, Threat

Post navigation

Previous Post: Palo Alto Networks Firewall Vulnerability Allows Unauthenticated Attackers to Trigger Denial of Service
Next Post: ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact

Related Posts

A Milestone Powering Crypto’s Global Reach Cyber Security News
New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide Cyber Security News
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News
FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information
  • Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
  • VoidLink Linux Malware Framework Targets Cloud Environments
  • ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact
  • Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information
  • Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
  • VoidLink Linux Malware Framework Targets Cloud Environments
  • ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact
  • Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark