• Home
  • Mobiles
  • Mobiles News
  • Google Disrupts Massive Proxy Network That Hijacked Millions of Smartphones, PCs for Cyberattacks

Google Disrupts Massive Proxy Network That Hijacked Millions of Smartphones, PCs for Cyberattacks

Google dismantles a large residential proxy network that secretly routed traffic through smartphones and PCs.

Google Disrupts Massive Proxy Network That Hijacked Millions of Smartphones, PCs for Cyberattacks

Photo Credit: Unsplash/Daniel Romero

Hackers can access the connected device’s home Internet and any unencrypted data

Click Here to Add Gadgets360 As A Trusted Source As A Preferred Source On Google
Highlights
  • Google and its partners took down the IPIDEA proxy network
  • The disruption was led by Google Threat Intelligence Group
  • These proxy networks are used by bad actors to carry out cybercrimes
Advertisement

Google Threat Intelligence Group (GTIG) and its partners announced the disruption of one of the world's largest proxy networks last week. The Mountain View-based tech giant said that it was able to successfully take down IPIDEA, one of the most notorious proxy networks that has been operating in the shadows for quite some time. The company said the residential proxy network secretly turned Android devices and Windows PCs into Internet proxies for bad actors, allowing them to route traffic via their home networks to mask the origin of malicious activity.

GTIG Takes Down Massive Proxy Network

In a blog post, the tech giant announced and detailed the disruption of the IPIDEA proxy network. For the unaware, a residential proxy network is an unauthorised and unethical service that routes Internet traffic through devices to disguise the true source of any activity. Instead of relying on commercial servers, these networks leverage compromised consumer devices to make connections appear to come from legitimate residential IP addresses.

Residential proxy networks are often used by attackers to mask malicious behaviour such as credential stuffing, content scraping, account takeovers and other forms of fraud. Because the traffic appears to come from everyday home or mobile IP addresses, it can be harder for security systems to distinguish legitimate users from illegitimate traffic. Google said it, along with its partners, identified the network, which used a variety of techniques to evade detection, including running hidden services on devices and obscuring command and control channels.

proxy network gtig Proxy network

How residential proxy networks operate
Photo Credit: Google

 

The blog post highlighted that the operation spread through a collection of malicious Android apps and proxy software on Windows PCs. The apps were distributed outside of official app stores as well as through third-party platforms, and included mechanisms to persist in the background while continuing to relay traffic. Google said that the malware's proxy functionality was often invisible to users, and in many cases the network ran without any obvious drain on battery life or data usage that might have alerted device owners.

To dismantle the infrastructure, GTIG and partners identified the command and control servers that managed the network and took steps to disrupt their operation. This included working with infrastructure providers and domain registrars to shut down domains and servers used to issue commands to compromised devices and to receive and forward proxy traffic. Google also said it updated its detection signals so that future attempts to set up similar networks using the same tools and techniques can be identified more quickly.

“We encourage mobile platforms, ISPs, and other tech platforms to continue sharing intelligence and implementing best practices to identify illicit proxy networks and limit their harms,” the tech giant said.

Comments

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Akash Dutta
Akash Dutta is a Chief Sub Editor at Gadgets 360. He is particularly interested in the social impact of technological developments and loves reading about emerging fields such as AI, metaverse, and fediverse. In his free time, he can be seen supporting his favourite football club - Chelsea, watching movies and anime, and sharing passionate opinions on food. More
Samsung Galaxy Watch Ultra 2, Galaxy Watch 9 and Galaxy Tab S12 Series Reportedly Listed on IMEI Database

Advertisement

Follow Us

Advertisement

© Copyright Red Pixels Ventures Limited 2026. All rights reserved.
Trending Products »
Latest Tech News »