WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Joint Cybersecurity Advisory – Defending Against China-Nexus Covert Networks of Compromised Devices
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Joint Cybersecurity Advisory – Defending Against China-Nexus Covert Networks of Compromised Devices

TLP:CLEAR

Author: Chase Snow

Created: Thursday, April 23, 2026 - 15:33

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

Summary: Today, CISA and several international partners released a joint cybersecurity advisory (JCSA) warning of China-nexus cyber actors leveraging large-scale “covert networks” of compromised devices, including small office/home office (SOHO) routers and internet-of-things (IoT) systems, to conduct cyber operations. These networks are used to obscure attribution and support activities across the cyber kill chain, including reconnaissance, command-and-control (C2), and data exfiltration. Given the persistent targeting of critical infrastructure, including water and wastewater systems, WaterISAC encourages members to review the JCSA and implement recommended defense measures.

Analyst Note: The advisory highlights a notable evolution in Chinese state-sponsored cyber operations, shifting away from dedicated infrastructure toward dynamic, distributed networks of compromised devices. These covert networks, often comprised of end-of-life or poorly secured edge devices, enable threat actors to blend malicious activity with legitimate traffic and rapidly rotate infrastructure, reducing the effectiveness of traditional IOC-based defenses such as static IP blocklists.

Notably, these networks have been associated with activity from groups such as Volt Typhoon and Flax Typhoon, which have targeted critical infrastructure to pre-position access and conduct espionage. The use of geographically proximate “exit-nodes” further complicates detection, as traffic may appear regionally legitimate.

For water utilities, this reinforces several longstanding risk theories:

  • The increased risk from internet-facing edge devices (e.g., routers, firewalls, VPN appliances).
  • The growing challenge of distinguishing legitimate from malicious traffic.
  • The limitations of relying solely on traditional perimeter and static indicators.

Additionally, the advisory underscores the concept of “IOC extinction,” in which the scale and dynamism of these networks render IP-based blocking less effective. Instead, defenders must prioritize behavioral analysis, network baselining, and identity-based controls.

Mitigation Considerations:

In light of this activity, WaterISAC encourages members to strengthen foundational cybersecurity practices and adapt defenses to account for dynamic, distributed threat infrastructure. Members are encouraged to consider:

  • Developing and maintaining a comprehensive inventory of network edge devices and external connections
  • Baselining normal network activity, particularly for VPN and remote access services
  • Implementing multifactor authentication (MFA) for all remote access points
  • Reducing exposure of internet-facing assets wherever possible
  • Leveraging dynamic threat intelligence feeds rather than static blocklists
  • Applying allow-listing approaches for remote access (e.g., IP, geography, device profiling) where feasible
  • Enhancing monitoring and anomaly detection capabilities, including use of NetFlow and behavioral analytics
  • Ensuring timely patching and replacement of end-of-life devices, particularly SOHO and IoT systems

Members with more advanced capabilities are encouraged to consider adopting zero trust architectures, actively hunting for anomalous connections from consumer or unexpected IP ranges, and tracking covert network infrastructure as part of ongoing threat intelligence efforts.

Original Source: https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-113a

Additional Reading:

  • A dozen allied agencies say China is building covert hacker networks out of everyday routers

Related WaterISAC PIRs: 6, 7, 7.1, 10, 10.1, 10.2, 12

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar