This week there was a coordinated operation that put in check one of the largest residential proxys networks used by malicious actors: IPIDEA. The initiative, led by the Google Threat Intelligence Group (GTIG) along with partners in the sector, managed to disconnect domains and stop infrastructure elements that managed infected devices and routed proxy traffic. The technical details disseminated by Google show an operation with global scope and organized sophistication, but also make it clear that the threat has not completely disappeared.
To understand the magnitude of the matter, it is worth remembering what is a network of residential proxys: it is an architecture that uses domestic IP addresses or small businesses to route traffic. When a computer - a mobile or a PC - is compromised, it can start acting as an "output node," allowing third parties to disguise their malicious activity by taking advantage of the legitimate appearance of those IP. In the case of IPIDEA, those responsible were advertising their services as if they were VPNs protecting navigation, while in the background they added the devices to a network that third parties could rent to operate more anonymously.

GTIG has documented that the network was huge in both size and diversity of abuse. In a single observation period, more than 550 different groups were identified using IPIDEA's exit nodes, including actors with alleged links in countries such as China, Iran, Russia and North Korea. These abuses ranged from attempts to access SaaS platforms, gross force campaigns and password spraying, to botnet control and infrastructure avoidance to hide the real source of traffic. Google describes how this technique greatly complicates the work of network advocates, because malicious traffic seems to come from real domestic users.
The mode of device recruitment was double. On the one hand, IPIDEA operators used development kits (SDK) that were embedded in seemingly legitimate Android applications: Google identified at least 600 apps cut with SDKs such as Packet, Castar, Hex or Earn, which transformed phones into proxy nodes without the explicit consent of the user. On the other hand, the network also fed on Windows binaries disguised - more than 3,000 samples detected - that simulated updates or utilities like "OneDriveSync," and that installed the proxy component in desktop equipment.
The scope of the platform is reflected in the figures that have transcended: the operators came to say that their service was used by millions of users worldwide and, technically, there was a hierarchy of command that organized the operation. According to the researchers, IPIDEA operated with a two-level command and control system: a first stratum that distributed configurations, timers and node lists; and a second stratum composed of thousands of servers (Google mentions about 7,400) that assigned proxy tasks and retransmitted traffic.
In addition to documenting the architecture, GTIG and its allies proceeded to break down domains linked to the network and to share intelligence about the SDKs that allowed its expansion. Google has published a report with a summary of the action and technique used to dismount parts of the infrastructure; the official release can be found on the Google Cloud blog, where the process and motivations of the operation are explained: Disrupting the largest residential proxy network.
The case also came to legal documents describing the impact and illicit uses of these residential proxys; a paper presented to the court details activities such as the massive creation of fraudulent accounts, the theft of credentials and the exfiltration of sensitive data, all facilitated by the masking provided by "clean" IP end-users. The text of that file is publicly available and provides a context on why the action was promoted: letter to the court about the operation.
The research also links IPIDEA to commercial brands that operated as residential proxy businesses, some of which were promoted as legitimate VPN or proxy services for customers. Although they seemed externally separate services, technical evidence points to several of these brands being centralized under a single operational control. Google states that there are, for now, no public arrests or formal accusations against individuals linked to the network, so the identity of operators remains a mystery.
The technical impact of the intervention includes changes in detection and mitigation: Google Play Protect already automatically blocks applications containing IPIDEA-associated SDKs on certified and updated Android devices. This measure reduces the risk to many Android users, but does not completely solve the problem, especially in environments where devices are not updated or installed from unknown sources.
Networks such as IPIDEA are not just a problem of privacy or misuse of bandwidth: they serve as an infrastructure for criminal activities ranging from gross force attacks on business services (VPN, SSH) to the support of botnets that launch massive DDoS. Security researchers had already related similar platforms to campaigns that abused residential proxys to amplify and hide attacks, and have observed Android botnets that combine infection and exploitation techniques of the same nature as those described in the IPIDEA case. For further reading on the operation and its context in the threat ecosystem, coverage can be reviewed in specialized media such as BleepingComputer or in technological press analysis such as ZDNet.
Although the coordinated operation probably significantly degraded IPIDEA's capacity, there are reasons not to lower the guard. Criminal networks often try to rebuild, modify their tools or migrate to other platforms; in addition, the SDKs ecosystem and stranded applications facilitate the rapid spread of new variants. In the face of this reality, the best defence is the combination of technical controls, user training and good digital hygiene practices.

If you are a private user or manage devices in a small organization, it is appropriate to take care of simple but effective measures: keep the operating system and up-to-date applications, avoid installing apps out of official stores without checking their reputation, distrust of applications that promise payment in exchange for bandwidth sharing, and review suspicious permissions in VPN applications or utilities. Integrated tools like Google Play Protect can help on Android, and there are antivirus and EDR solutions for Windows environments that detect abnormal behaviors. The Google Help page on Play Protect offers useful information for Android users: Google Play Protect.
At the organizational level, security teams should strengthen the monitoring of unusual endpoints behaviour, apply network segmentation to limit the scope of a committed equipment and deploy multifactor authentication in critical services to mitigate the effect of stolen credentials. It is also recommended that companies maintain intelligence exchange channels with suppliers and the security community to respond quickly to threats of this nature.
The operation against IPIDEA is a reminder that the threat landscape continues to evolve towards models where illicit infrastructure is camouflaged between legitimate users. The intervention of GTIG and its partners shows that collaboration between large platforms and industry can stop these networks, but the practical lesson is clear: protecting itself requires both centralized technical actions and changes in the behaviour of users and administrators. Monitoring and prevention are, more than ever, a shared responsibility.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...