Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Posted on January 15, 2026January 15, 2026 By CWS

Menace actors linked to Chinese language internet hosting infrastructure have established a large community of over 18,000 lively command-and-control servers throughout 48 completely different internet hosting suppliers in current months.

This widespread abuse highlights a critical challenge in how malicious infrastructure can conceal inside trusted networks and cloud providers.

Conventional risk looking strategies that concentrate on particular person IP addresses or domains typically miss the larger image as a result of attackers always change these indicators to keep away from detection.

The analysis reveals that these C2 servers make up about 84 p.c of all malicious exercise noticed inside Chinese language internet hosting environments through the three-month evaluation interval.

Host Radar features (Supply – Hunt.io)

Phishing infrastructure accounts for round 13 p.c, whereas malicious open directories and public indicators of compromise collectively symbolize lower than 4 p.c of detected threats.

This reveals that command-and-control operations dominate the risk panorama, with attackers preferring steady infrastructure that may coordinate ongoing campaigns throughout a number of targets.

Hunt.io analysts recognized this in depth infrastructure community utilizing their Host Radar platform, which mixes C2 detection, phishing identification, open listing scanning, and indicator extraction right into a single intelligence system.

Fairly than treating every malicious artifact as remoted, the platform maps these threats again to the internet hosting suppliers and community operators the place they exist. This strategy reveals long-running abuse patterns even when particular person IP addresses change often.

China Unicom emerged as the biggest host of malicious infrastructure, accounting for practically half of all noticed C2 servers with roughly 9,000 detections.

Alibaba Cloud and Tencent every hosted round 3,300 C2 servers, exhibiting that main cloud platforms are closely focused by risk actors who worth their speedy provisioning and excessive availability.

These three suppliers alone symbolize nearly all of detected malicious command-and-control infrastructure inside China.

Infrastructure Focus and Malware Distribution

The malware households working by way of this infrastructure present clear patterns of repeated framework abuse. Mozi botnet dominates with 9,427 distinctive C2 IP addresses, representing greater than half of all noticed command-and-control exercise.

The ARL framework follows with 2,878 C2 endpoints, suggesting in depth misuse of post-exploitation and red-team tooling for malicious functions.

High 10 Chinese language infrastructure suppliers by variety of detected C2 servers (Supply – Hunt.io)

Cobalt Strike seems with 1,204 detections, whereas Vshell and Mirai spherical out the highest 5 with 830 and 703 C2 servers respectively.

This focus means defenders can focus monitoring efforts on shared infrastructure patterns fairly than chasing particular person malware variants that always evolve.

The information reveals that cybercrime operations, botnet infrastructure, and state-linked espionage instruments coexist throughout the identical internet hosting environments.

Campaigns starting from commodity distant entry trojans to stylish APT operations leverage these suppliers, creating a posh risk ecosystem the place conventional indicator-based defenses wrestle to keep up effectiveness.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Active, Actors, Chinese, Hosted, Hosting, Providers, Servers, Threat

Post navigation

Previous Post: Palo Alto Networks Firewall Vulnerability Allows Unauthenticated Attackers to Trigger Denial of Service
Next Post: Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login

Related Posts

Cloud Security Essentials – Protecting Multi-Cloud Environments Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
How SOCs Detect More Threats without Alert Overload How SOCs Detect More Threats without Alert Overload Cyber Security News
Cobalt Strike 4.12 Released With New Process Injection, UAC Bypasses and Malleable C2 Options Cobalt Strike 4.12 Released With New Process Injection, UAC Bypasses and Malleable C2 Options Cyber Security News
Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover Cyber Security News
MathWorks Confirms Cyberattack, User Personal Information Stolen MathWorks Confirms Cyberattack, User Personal Information Stolen Cyber Security News
New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News