












On April 23, 2026, the National Cyber Security Centre (NCSC-UK) and 15 international partners including CISA, FBI, NSA, and agencies from Australia, Canada, Germany, Japan, Netherlands, New Zealand, Spain, and Sweden released a joint advisory on state-sponsored covert botnet networks targeting critical infrastructure globally. While the advisory primarily addresses government and critical infrastructure defense, cross-border e-commerce sellers face significant indirect operational risks through compromised payment processors, cloud infrastructure providers, and logistics partners that handle their business operations.
The threat landscape has fundamentally shifted. Chinese state-backed threat actors now deploy covert networks using 200,000+ compromised SOHO routers, IoT devices, printers, and web cameras (Raptor Train botnet documented in 2024; KV Botnet used in Volt Typhoon attacks; LapDog botnet targeting Japan and Taiwan). These networks operate through entry nodes, traversal nodes, and exit nodes to obscure malicious traffic origins, making traditional IP blocklists ineffective. The advisory confirms that Chinese cybersecurity companies, including Integrity Technology Group, actively build and maintain these networks for state operational use. This represents a critical shift from individually procured infrastructure toward large-scale externally provisioned compromised device networks.
For e-commerce sellers, the operational implications are substantial. Sellers relying on Amazon Web Services (AWS), Shopify cloud infrastructure, PayPal payment processing, or third-party logistics (3PL) providers face elevated espionage and data theft risks. The advisory warns that single covert networks may be exploited by multiple threat actors simultaneously, amplifying organizational risk. The Federal Communications Commission (FCC) responded by banning foreign-made router imports in March 2025 (with Netgear exemption in April), signaling supply-chain vulnerability concerns. Britain handles approximately four nationally significant cyber incidents weekly, with highest-impact attacks increasingly tied to government actors rather than criminal gangs. Google's 2026 disruption of residential proxy networks used by both cybercrime groups and state actors underscores the widespread nature of this threat ecosystem.
Immediate seller actions required: Implement multifactor authentication (MFA) for all remote access to seller accounts, payment systems, and inventory management platforms. Map network connectivity including consumer broadband connections used for business operations. Deploy IP allowlisting for trusted vendor and logistics partner connections. Establish baseline connectivity profiles to detect anomalous traffic patterns. High-risk sellers (those shipping to US, UK, Japan, Taiwan, or Australia) should implement zero-trust security principles and SSL certificate requirements for all external connections. Monitor payment processor and cloud provider security bulletins weekly. Consider shifting sensitive data storage from cloud to on-premise systems with air-gapped backups. The advisory emphasizes that traditional static malicious IP blocklists are increasingly ineffective against dynamic botnet infrastructure where new nodes continuously replace patched or removed devices.