Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Ipidea proxy network Google Threat Intelligence cybersecurity residential proxy botnet malware online security
Brandon Woo
Brandon Woo

System Architect

 
February 27, 2026 4 min read
Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

TL;DR

  • Google's Threat Intelligence Group has dismantled Ipidea, a massive residential proxy network. This network, which leveraged millions of home IP addresses, was extensively used by cybercriminals for illicit activities like credential stuffing and malware obfuscation. Google's actions have crippled Ipidea's operations by taking down control infrastructure and enforcing platform policies against malicious SDKs.

Google Disrupted Ipidea Proxy Network Used by Cybercriminals

Google has taken action against Ipidea, a large residential proxy network. This network was being used by cyberattackers to hide their activities.

Millions of Home IPs for Hire

Residential proxy networks consist of proxy servers that route internet traffic through real residential IP addresses. According to Google Threat Intelligence Group (GTIG), these networks require control of millions of residential IP addresses to sell to customers.

Ipidea proxy network disrupted

Image courtesy of Help Net Security

Residential proxy network operators need code running on consumer devices to enroll them into the network as exit nodes. Devices are either pre-loaded with proxy software or joined to the proxy network when users unknowingly download trojanized applications with embedded proxy code. Some users install this software knowingly, enticed by the idea of monetizing their spare bandwidth. The proxy provider then sells access to the infected device’s network bandwidth.

Residential proxies can be used for:

  • Market research
  • Price comparison
  • Fraud verification
  • App testing
  • SEO monitoring
  • Cybersecurity research

However, they are also used for:

  • Credential stuffing
  • Account abuse
  • Data scraping
  • Ad fraud
  • Ticket scalping
  • Malware C2 obfuscation
  • Phishing campaigns
  • Evading detection and IP blacklists

IP addresses in the US, Canada, and Europe are highly desirable, according to Google’s threat researchers.

Disrupting the Ipidea Proxy Network

According to Google, the Ipidea proxy network is operated by a Chinese company of the same name. This company controls other proxy and VPN brands like 922 Proxy, 360 Proxy, Luna Proxy, Galleon VPN and Radish VPN.

Google took down C2 domains for controlling devices and proxy traffic, as well as domains used to market proxy software and the Ipidea software development kits (SDKs), crippling the proxy network. The company also found over 600 Android apps using the Ipidea SDKs.

GTIG enforced platform policies against trojanizing software. Google Play Protect now warns users and removes applications known to incorporate Ipidea software development kits (SDKs), and blocks future install attempts.

Ipidea network tiers

Image courtesy of Cyber Insider

Google believes these actions have significantly degraded Ipidea’s proxy network and business operations, reducing the available pool of devices by millions. Because proxy operators share pools of devices using reseller agreements, these actions may have downstream impact across affiliated entities, according to threat researchers.

Google has shared information about Ipidea’s SDKs and proxy software with platform providers, law enforcement, and research firms. This allows them to take additional action to limit their distribution and the harm from malicious use of the network.

Ipidea's Two-Tier Infrastructure

Ipidea’s infrastructure model is a two-tier system. Tier One servers directed infected devices to a rotating set of Tier Two nodes, which issued proxy instructions and routed payloads. GTIG identified approximately 7,400 Tier Two servers globally.

GTIG identified over 600 Android applications and more than 3,000 Windows binaries communicating with Ipidea’s control infrastructure. Many were repackaged utilities or benign-looking apps that offered superficial functionality while silently enrolling the device into the proxy network. Others mimicked trusted system tools like OneDrive Sync or Windows Update to evade detection.

SDKs and Associated Risks

GTIG also linked the SDK infrastructure to previously identified malware campaigns including BadBox2.0, Aisuru, and Kimwolf. State-sponsored actors from China, North Korea, Iran, and Russia were observed leveraging Ipidea exit nodes for covert operations.

One of the SDKs backing IPIDEA

SDK

Image courtesy of Cyber Insider

The broader danger lies not only in facilitating threat actor obfuscation but in the risk to individuals whose devices are compromised. When a device becomes an exit node, it may inadvertently host malicious traffic, exposing the owner to reputational harm, ISP blacklisting, or network intrusion. GTIG's analysis showed that some proxy SDKs didn't just route traffic through a device, they also received inbound traffic, opening pathways for lateral movement and further compromise within home networks, according to GTIG.

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, helping organizations defend against sophisticated threats. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography. Like Google, we are committed to disrupting malicious networks and enhancing digital security.

To learn more about how Gopher Security can protect your organization, visit our website or contact us.

Brandon Woo
Brandon Woo

System Architect

 

10-year experience in enterprise application development. Deep background in cybersecurity. Expert in system design and architecture.

Related News

Pentagon Leaders Anticipate Cybercom 2.0 to Counter Chinese Threats
Cybercom 2.0

Pentagon Leaders Anticipate Cybercom 2.0 to Counter Chinese Threats

The Pentagon is overhauling its cyber defenses with Cybercom 2.0. Discover how specialization, AI, and innovation are reshaping the fight against threats like China's Volt Typhoon. Learn more!

By Jim Gagnard February 26, 2026 3 min read
common.read_full_article
FBI Seizes RAMP Ransomware Forum Linked to Cybercrime Operations
RAMP ransomware forum

FBI Seizes RAMP Ransomware Forum Linked to Cybercrime Operations

The FBI has successfully seized RAMP, a major dark web forum used by ransomware gangs. Discover the impact of this takedown on cybercrime operations. Read more!

By Brandon Woo February 23, 2026 3 min read
common.read_full_article
New Britain Ransomware Attack Disrupts City Services, FBI Involved
New Britain cyberattack

New Britain Ransomware Attack Disrupts City Services, FBI Involved

New Britain faces a major ransomware attack disrupting city services. Learn about the ongoing investigation, impact on operations, and essential services. Discover how to enhance your cybersecurity.

By Alan V Gutnov February 20, 2026 3 min read
common.read_full_article
New Britain Ransomware Attack and Fire Disrupt City Operations
New Britain ransomware attack

New Britain Ransomware Attack and Fire Disrupt City Operations

New Britain faces network disruption from a ransomware attack, impacting city departments. Meanwhile, a major fire damages a downtown factory. Learn how to protect your city.

By Brandon Woo February 10, 2026 3 min read
common.read_full_article