Google’s Domain Strike Dismantles Chinese Proxy Empire Fueling Kimwolf Botnet Menace

Google seized Ipidea domains in a court-ordered takedown, severing nine million devices from a Chinese proxy network tied to the massive Kimwolf botnet and BadBox threats, exposing risks to homes, firms, and governments worldwide.
Google’s Domain Strike Dismantles Chinese Proxy Empire Fueling Kimwolf Botnet Menace
Written by Zane Howard

Google has delivered a decisive strike against Ipidea, a secretive Chinese firm accused of building one of the world’s largest residential proxy networks by secretly enlisting millions of consumer devices. On Wednesday, leveraging a federal court order, Alphabet’s unit seized control of dozens of domains tied to Ipidea, effectively shuttering its public websites and technical infrastructure. The move, linked to Google’s ongoing BadBox 2.0 litigation, is projected to eject over nine million Android devices from the network, according to Google statements reported by the Wall Street Journal.

Ipidea, founded in 2020 and headquartered somewhere in China with several hundred employees, operates under at least 13 brands including 922 Proxy, Py Proxy, and 360 Proxy. Its network spans 220 countries with ‘tens of millions’ of devices, many compromised unknowingly via bundled code in mobile games, free VPN apps, and pre-installed software on cheap Android TV boxes, digital frames, and projectors. A spokeswoman acknowledged prior ‘relatively aggressive market expansion strategies’ and promotions on hacker forums but claimed reforms, insisting services support legitimate data collection, ad verification, and antifraud efforts, as cited in the Wall Street Journal.

Google also purged hundreds of affiliated apps from Android ecosystems, building on its July 2025 lawsuit against BadBox 2.0 operators—anonymous Chinese entities controlling over 10 million uncertified IoT devices for ad fraud and proxy services. That New York federal court case yielded injunctions and now extends to Ipidea due to operational ties, per Google’s official blog.

Proxy Networks: Hidden Relays in Everyday Homes

Residential proxy services like Ipidea’s function as bandwidth marketplaces, renting access to infected devices for anonymous browsing or data scraping. Users often remain oblivious, their phones or smart TVs routing criminal traffic. ‘If you take your phone into work and if your phone had access to internal corporate resources, now any proxy user has access to those same resources,’ warned Riley Kilmer, co-founder of Spur Intelligence, which monitors proxy activity, as quoted in the Wall Street Journal.

John Hultquist, chief analyst at Google’s Threat Intelligence Group, emphasized the dual peril: ‘It’s a consumer issue and it’s a national-security issue at the same time. It’s enabling some of the most serious threats to our country.’ State actors and criminals, including Russia’s Midnight Blizzard group behind a 2023 Microsoft breach, have masked operations via such proxies.

Legitimate applications exist, but Ipidea gained notoriety marketing on criminal forums since late 2022, per Kilmer. Its scale—advertising over 100 million endpoints weekly—dwarfs rivals, with resellers like ABCProxy and LunaProxy under the ‘HK Network’ umbrella, as detailed by Krebs on Security.

Kimwolf Botnet: Proxies Turned Weapon

Last fall, hackers exploited a flaw in Ipidea’s network, hijacking at least two million devices to form the Kimwolf botnet—the most potent ever for DDoS assaults overwhelming sites with trillions of junk data bits per second, according to Akamai’s Chad Seaman, referenced in the Wall Street Journal.

Synthient researchers, led by Benjamin Brundage, tracked Kimwolf since October 2025, pinpointing its explosive growth via Ipidea proxies. By December 1, 2025, they confirmed one-to-one overlaps between infections and Ipidea IPs, with the botnet rebounding from near-zero to two million nodes in days by tunneling through endpoints. ‘Kimwolf has almost doubled in size this past week, just by exploiting IPIDEA’s proxy pool,’ Brundage noted, as reported by Krebs on Security.

Kimwolf targets exposed Android Debug Bridge (ADB) on port 5555 in cheap TV boxes lacking authentication—67% of Ipidea’s Android pool vulnerable to remote code execution. Devices arrive pre-loaded with proxy SDKs, enabling lateral scans into home, corporate, and government LANs for ad fraud, credential stuffing, and more, per Bleeping Computer and The Hacker News.

Infiltration of Critical Sectors

Spur’s January 16, 2026 webinar revealed Ipidea proxies infiltrating 298 government networks—many U.S. Department of Defense—plus 318 utilities, 166 healthcare firms, and 141 banks. Synthient spotted 33,000 university IPs and 8,000 government proxies compromised. ‘I looked at the 298 government owned and operated networks, and so many of them were DoD, which is kind of terrifying,’ said Kilmer, via Krebs on Security.

Infoblox detected 25% of clients querying Kimwolf domains since October 2025, signaling scans behind firewalls. Proxies bypass NAT via DNS tricks to RFC-1918 ranges, dropping malware. Ipidea patched December 27-28, 2025, blocking local access and risky ports after Synthient alerts, but risks linger on infected endpoints.

BadBox 2.0 ties bind it all: Google sued 25 Chinese ‘Does’ in 2025 for the 10-million-device botnet, now explicitly linked to Ipidea distribution, as uncovered by HUMAN Security and Trend Micro, detailed in Google’s blog and The Hacker News.

Remediation and Lingering Shadows

Google’s Play Protect now blocks BadBox apps, but experts urge destroying suspect TV boxes—favor Chromecast or NVIDIA Shield. Synthient offers a scanner for Kimwolf. Ipidea claims opposition to abuse, but its 911S5 Proxy lineage—U.S. sanctioned in 2024—raises doubts, per Krebs on Security.

Chad Seaman stressed: ‘The whole security model where people think their LAN is safe… is just really outdated now.’ As proxies evolve with AI rotation and 5G, takedowns like Google’s expose vulnerabilities but highlight the need for device vetting and network segmentation, echoing Comcast’s analysis.

This offensive caps years of escalation, from BadBox origins to Kimwolf’s scale, forcing industry reckoning on proxy supply chains powering cyber threats.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us