Google Disrupts Chinese Proxy Network Used by Cybercriminals in Global Takedown
#Security

Google Disrupts Chinese Proxy Network Used by Cybercriminals in Global Takedown

Business Reporter
2 min read

Google executed coordinated legal action against Chinese firm Ipidea, dismantling its residential proxy network infrastructure used by hackers to anonymize attacks through compromised devices.

Google has dismantled key infrastructure belonging to Chinese residential proxy provider Ipidea through targeted legal action, disrupting a network widely exploited by cybercriminals to mask malicious activities. The tech giant successfully petitioned U.S. courts to seize dozens of domains central to Ipidea's operations, effectively crippling the service's ability to route traffic through millions of compromised devices globally. This marks one of the most significant disruptions to the underground proxy ecosystem in recent years.

Featured image

Residential proxy networks like Ipidea's operate by installing software on consumer devices—often without explicit consent—to reroute internet traffic through residential IP addresses. According to cybersecurity researchers, such networks process over 5 billion daily requests globally, with malicious actors accounting for an estimated 30-40% of traffic. Ipidea specifically offered access to over 90 million residential IPs across 200+ regions, charging as little as $0.80 per GB for traffic anonymization services favored by hackers conducting credential stuffing, distributed denial-of-service (DDoS) attacks, and ad fraud.

The legal filings reveal Google tracked over 167,000 malicious campaigns routed through Ipidea's infrastructure in 2025 alone, including phishing operations targeting Gmail and Google Cloud users. Forensic analysis showed compromised devices in U.S. households accounted for 28% of the network's exit nodes, unknowingly enabling attacks against their own communities. This exploitation violates Google's Terms of Service and infringes on digital trespassing statutes across multiple jurisdictions.

Financially, proxy networks fuel a $2.3B underground economy for cybercrime-as-a-service tools. Ipidea's disruption will immediately impact ransomware groups leveraging the service, with threat intelligence firms noting a 57% spike in dark web chatter about alternative proxy solutions within 24 hours of the takedown. Google Cloud's Threat Intelligence team stated the operation will "increase operational costs for attackers by 30-50%" due to reduced anonymity options.

Strategically, this action signals Google's escalation of offensive legal tactics against cybercriminal supply chains. The company has filed 24 similar cases since 2023, but the Ipidea case represents its first successful dismantling of a major Chinese proxy operator. Industry analysts note this coincides with U.S. pressure on China to curb cybercrime havens, following Treasury Department sanctions last November against three other Chinese proxy services. Enterprises should expect reduced credential-stuffing attempts in the short term, though persistent threat actors may migrate to decentralized alternatives like Mysterium Network or Luminati alternatives.

Google recommends organizations implement reCAPTCHA Enterprise and Chronicle SIEM for enhanced proxy traffic detection. For consumers, the incident underscores the critical need to audit installed applications and IoT devices for unauthorized proxy software, particularly as smart home adoption reaches 71% of U.S. households. Legal experts anticipate regulatory proposals requiring explicit opt-in consent for residential bandwidth sharing within the next 12 months.

Comments

Loading comments...