Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Ipidea proxy network Google Threat Intelligence cybersecurity residential proxy botnet malware online security
Brandon Woo
Brandon Woo

System Architect

 
February 27, 2026 4 min read
Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

TL;DR

  • Google's Threat Intelligence Group has dismantled Ipidea, a massive residential proxy network. This network, which leveraged millions of home IP addresses, was extensively used by cybercriminals for illicit activities like credential stuffing and malware obfuscation. Google's actions have crippled Ipidea's operations by taking down control infrastructure and enforcing platform policies against malicious SDKs.

Google Disrupted Ipidea Proxy Network Used by Cybercriminals

Google has taken action against Ipidea, a large residential proxy network. This network was being used by cyberattackers to hide their activities.

Millions of Home IPs for Hire

Residential proxy networks consist of proxy servers that route internet traffic through real residential IP addresses. According to Google Threat Intelligence Group (GTIG), these networks require control of millions of residential IP addresses to sell to customers.

Ipidea proxy network disrupted

Image courtesy of Help Net Security

Residential proxy network operators need code running on consumer devices to enroll them into the network as exit nodes. Devices are either pre-loaded with proxy software or joined to the proxy network when users unknowingly download trojanized applications with embedded proxy code. Some users install this software knowingly, enticed by the idea of monetizing their spare bandwidth. The proxy provider then sells access to the infected device’s network bandwidth.

Residential proxies can be used for:

  • Market research
  • Price comparison
  • Fraud verification
  • App testing
  • SEO monitoring
  • Cybersecurity research

However, they are also used for:

  • Credential stuffing
  • Account abuse
  • Data scraping
  • Ad fraud
  • Ticket scalping
  • Malware C2 obfuscation
  • Phishing campaigns
  • Evading detection and IP blacklists

IP addresses in the US, Canada, and Europe are highly desirable, according to Google’s threat researchers.

Disrupting the Ipidea Proxy Network

According to Google, the Ipidea proxy network is operated by a Chinese company of the same name. This company controls other proxy and VPN brands like 922 Proxy, 360 Proxy, Luna Proxy, Galleon VPN and Radish VPN.

Google took down C2 domains for controlling devices and proxy traffic, as well as domains used to market proxy software and the Ipidea software development kits (SDKs), crippling the proxy network. The company also found over 600 Android apps using the Ipidea SDKs.

GTIG enforced platform policies against trojanizing software. Google Play Protect now warns users and removes applications known to incorporate Ipidea software development kits (SDKs), and blocks future install attempts.

Ipidea network tiers

Image courtesy of Cyber Insider

Google believes these actions have significantly degraded Ipidea’s proxy network and business operations, reducing the available pool of devices by millions. Because proxy operators share pools of devices using reseller agreements, these actions may have downstream impact across affiliated entities, according to threat researchers.

Google has shared information about Ipidea’s SDKs and proxy software with platform providers, law enforcement, and research firms. This allows them to take additional action to limit their distribution and the harm from malicious use of the network.

Ipidea's Two-Tier Infrastructure

Ipidea’s infrastructure model is a two-tier system. Tier One servers directed infected devices to a rotating set of Tier Two nodes, which issued proxy instructions and routed payloads. GTIG identified approximately 7,400 Tier Two servers globally.

GTIG identified over 600 Android applications and more than 3,000 Windows binaries communicating with Ipidea’s control infrastructure. Many were repackaged utilities or benign-looking apps that offered superficial functionality while silently enrolling the device into the proxy network. Others mimicked trusted system tools like OneDrive Sync or Windows Update to evade detection.

SDKs and Associated Risks

GTIG also linked the SDK infrastructure to previously identified malware campaigns including BadBox2.0, Aisuru, and Kimwolf. State-sponsored actors from China, North Korea, Iran, and Russia were observed leveraging Ipidea exit nodes for covert operations.

One of the SDKs backing IPIDEA

SDK

Image courtesy of Cyber Insider

The broader danger lies not only in facilitating threat actor obfuscation but in the risk to individuals whose devices are compromised. When a device becomes an exit node, it may inadvertently host malicious traffic, exposing the owner to reputational harm, ISP blacklisting, or network intrusion. GTIG's analysis showed that some proxy SDKs didn't just route traffic through a device, they also received inbound traffic, opening pathways for lateral movement and further compromise within home networks, according to GTIG.

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, helping organizations defend against sophisticated threats. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography. Like Google, we are committed to disrupting malicious networks and enhancing digital security.

To learn more about how Gopher Security can protect your organization, visit our website or contact us.

Brandon Woo
Brandon Woo

System Architect

 

10-year experience in enterprise application development. Deep background in cybersecurity. Expert in system design and architecture.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article