Article Details

Scrape Timestamp (UTC): 2026-01-29 17:06:23.576

Source: https://www.theregister.com/2026/01/29/google_ipidea_crime_network/

Original Article Text

Click to Toggle View

To stop crims, Google starts dismantling residential proxy network they use to hide. The Chocolate Factory strikes again, targeting the infrastructure attackers use to stay anonymous. Crims love to make it look like their traffic is actually coming from legit homes and businesses, and they do so by using residential proxy networks. Now, Google says it has "significantly degraded" what it believes is one of the world's largest residential proxy networks. Google's Threat Intelligence Group (GTIG) describes IPIDEA as a "little-known component of the digital ecosystem" and says that in a seven-day period in January 2026, it observed more than 550 threat groups using IPIDEA exit nodes. GTIG said that proxy network operators sometimes pay app developers to embed proxy SDKs so that any device that downloads the app is enrolled in the network. IPIDEA is also known to distribute proxy software and SDKs that enroll devices in its network, sometimes marketed as a way for users to "monetize" spare bandwidth. The Googlers said that not only do these networks allow bad actors to conceal their malicious traffic, but users who enroll their devices are opening themselves up for further attacks, as their device may be used as a launchpad to compromise their other devices. Researchers say the disruption reduced IPIDEA's available pool of devices by millions, spanning smartphones, Windows PCs, and other consumer hardware, with residential IPs in the US, Canada, and Europe seen as the most desirable. They also discovered that IPIDEA operators were directly controlling some of the SDKs that were found in the apps enrolling people's devices into the network. Residential proxies are not illegal. Proxy operators frequently pitch them as tools for privacy or freedom of expression, although security researchers say they are overwhelmingly abused by threat actors. IPIDEA not only benefited cybercriminals seeking anonymity, but in several cases also enrolled the same devices it recruited to its proxy network into large botnets, including BadBox 2.0, Aisuru, and Kimwolf. GTIG worked with industry partners to disrupt the IPIDEA network, including Spur and Lumen's Black Lotus Labs, to better understand its scale, and Cloudflare to disrupt IPIDEA's domain resolution. The security experts' work stops short of a claim of a full takedown: GTIG says its actions reduced IPIDEA's available pool of devices by millions and are intended to have downstream effects on affiliated operators and resellers. "Residential proxy networks have become a pervasive tool for everything from high-end espionage to massive criminal schemes," said John Hultquist, chief analyst at GTIG. "By routing traffic through a person's home internet connection, attackers can hide in plain sight while infiltrating corporate environments.  "By taking down the infrastructure used to run the IPIDEA network, we have effectively pulled the rug out from under a global marketplace that was selling access to millions of hijacked consumer devices."

Daily Brief Summary

CYBERCRIME // Google Disrupts Major Residential Proxy Network Used by Cybercriminals

Google’s Threat Intelligence Group (GTIG) has significantly disrupted IPIDEA, a large residential proxy network exploited by over 550 threat groups in January 2026.

Residential proxy networks allow cybercriminals to mask their malicious traffic as legitimate, posing significant risks to both individual users and corporate environments.

IPIDEA was found to enroll devices into its network via proxy software and SDKs, often without the users' full understanding, compromising millions of devices.

The disruption of IPIDEA's operations involved collaboration with industry partners like Spur, Lumen's Black Lotus Labs, and Cloudflare, targeting domain resolution and network infrastructure.

GTIG's actions reduced the pool of compromised devices by millions, impacting the network's ability to support criminal activities and potentially affecting associated botnets.

Residential proxies, while legal, are frequently misused for anonymity in cybercrime, with IPIDEA linked to botnets such as BadBox 2.0, Aisuru, and Kimwolf.

The initiative aims to have long-term impacts on cybercriminal marketplaces, reducing the availability of hijacked consumer devices for malicious purposes.