Global botnets are being abused by hackers — and they can even hide all the evidence using ORB networks

cyber, attack, hacked word on screen binary code display, hacker
(Image credit: Shutterstock/supimol kumying)

Threat actors are constantly evolving their techniques to remain undetected when infiltrating organizations, with new research revealing how persistent groups like Volt Typhoon are evading detection.

Mandiant has observed increased usage of operational relay box networks (ORBs) to obscure indicators of compromise (IoC). These ORBs are essentially a botnet made of IoT devices, virtual private servers, smart devices, and older routers that no longer receive security updates.

This complex mesh of devices helps to hide the activity of threat actors, with Mandiant assessing with moderate confidence that this technique is being used to push back against defenders by hiding their activity and complicating attribution.

Threat actors turn to global ORBs

To break it down into more simple terms, an ORB is a collection of devices from around the globe managed and administered by independent entities, and individuals within the People’s Republic of China. The ORB network is used by many different APT groups to obfuscate their activity.

John Hultquist, Mandiant Principal Analyst at Google Cloud, summed up the use of ORBs, stating that, “Chinese cyber espionage was once noisy and easily trackable. This is a new type of adversary.”

By cycling their internet traffic through devices located geographically nearby to the target organization, threat actors can blend in with traffic that may otherwise appear legitimate. This technique is particularly effective against enterprise-level organizations with a constantly changing infrastructure.

More often than not, the owners of the compromised devices are not aware that they are contributing to the ORB, with some IPv4 addresses only being active as a node in the network for as few as 31 days.

By using ORB networks, threat actors are removing the typical IoCs on which defenders rely to identify a potential breach or intrusion. Typically, a defender could be alerted to traffic that is outside the geographical boundaries of their network, or be able to attribute an attack to a particular actor by analyzing the network infrastructure used to launch the attack.

“ORB networks are one of the major innovations in Chinese cyber espionage that are challenging defenders. They’re like a maze that is continually reconfiguring with the entrance and the exit disappearing from the maze every 60 - 90 days,” said Michael Raggi, Mandiant Principal Analyst at Google Cloud.

“In order to target someone, these actors may be coming from a home router right down the street.  It’s not unusual for an entirely unwitting person’s home router to be involved in an act of espionage,” he concluded.

More from TechRadar Pro

TOPICS
Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
ID theft
New Androxgh0st botnet targets vulnerabilities in IoT devices and web applications via Mozi integration
China
Chinese hackers develop effective new hacking technique to go after business networks
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
IoT’s botnet problem is up 500% – three things admins must do now
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
A red padlock image against a digital map of the earth in blue.
Midnight Blizzard hacking group hijacks RDP proxies to launch malware attacks
Latest in Pro
Homepage of Manus, a new Chinese artificial intelligence agent capable of handling complex, real-world tasks, is seen on the screen of an iPhone.
Manus AI may be the new DeepSeek, but initial users report problems
healthcare
Software bug meant NHS information was potentially “vulnerable to hackers”
Hospital
Major Oracle outage hits US Federal health record systems
A hacker wearing a hoodie sitting at a computer, his face hidden.
Experts warn this critical PHP vulnerability could be set to become a global problem
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
A computer screen showing a spreadsheet in use.
This entire nation's public health department was found to be running on a single Excel spreadsheet
Latest in News
Lego Mario Kart – Mario & Standard Kart set on a shelf.
Lego just celebrated Mario Day in the best way possible, with an incredible Mario Kart set that's up for preorder now
TCL QM7K TV on orange background
TCL’s big, bright new mid-range mini-LED TVs have built-in Bang & Olufsen sound
Homepage of Manus, a new Chinese artificial intelligence agent capable of handling complex, real-world tasks, is seen on the screen of an iPhone.
Manus AI may be the new DeepSeek, but initial users report problems
Google Maps
Nightmare Google Maps glitch is deleting timelines, and there isn't a fix yet
Twitter social media application change logo to X. Elon Musk CEO of twitter rebranded Twitter to 'X'. Social media application technology concept.
X is down again – Elon Musk confirms 'massive cyberattack' as former Twitter site hit by fourth outage today
Joe Goldberg and Kate Lockwood sitting at a table and looking at the camera in You season 5.
Netflix releases a killer new trailer for You season 5 but my favorite character is missing from Joe's final chapter