Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Silent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN

0
Medium
Published: Tue Feb 10 2026 (02/10/2026, 09:09:44 UTC)
Source: AlienVault OTX General

Description

An investigation using Silent Push's Traffic Origin and residential proxy data revealed a suspicious Chinese VPN provider. The analysis focused on IP address 205.198.91.155, which showed unusual traffic from Russia, China, Myanmar, Iran, and Venezuela. This IP was linked to the domain lvcha.in, hosting a Chinese-language VPN. Further investigation uncovered nearly 50 related domains promoting the same VPN, suggesting attempts to bypass country-level firewalls. The VPN's infrastructure was found to use residential proxies and had connections to various high-risk countries. This case study demonstrates the importance of verifying physical and technical behaviors of connections to protect against fraud and state-sponsored actors using stolen identities and spoofed locations.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:15:40 UTC

Technical Analysis

This threat involves a suspicious Chinese VPN provider identified through a combined analysis of Silent Push's Traffic Origin data and residential proxy data. The investigation centered on IP address 205.198.91.155, associated with the domain lvcha.in, which hosts a Chinese-language VPN service. Nearly 50 related domains were found promoting the same VPN, suggesting a coordinated effort to evade country-level firewalls and censorship mechanisms. Traffic analysis revealed unusual connections originating from countries considered high risk or under heavy surveillance, including Russia, China, Myanmar, Iran, and Venezuela. The VPN infrastructure uses residential proxies, which are IP addresses assigned to ordinary users, to mask the true origin of traffic and complicate attribution. This technique enables geolocation spoofing and can facilitate fraudulent activities or state-sponsored operations that rely on stolen identities and spoofed locations. The campaign is tagged with MITRE ATT&CK techniques such as T1133 (External Remote Services), T1608.004 (Stage Capabilities: Proxy), T1090 (Proxy), T1584 (Compromise Infrastructure), and T1608.005 (Stage Capabilities: VPN). No known exploits are currently active in the wild, and no specific vulnerabilities or patches are identified. The medium severity rating reflects the potential for misuse in evading detection and censorship circumvention, rather than direct exploitation of software vulnerabilities. This case study highlights the importance of verifying both physical and technical behaviors of network connections to defend against fraud and sophisticated adversaries leveraging proxy and VPN infrastructure.

Potential Impact

For European organizations, this threat poses risks primarily related to network security and trustworthiness of VPN connections. Unauthorized or suspicious VPN usage can facilitate data exfiltration, bypass of security controls, and complicate attribution of malicious activity. The use of residential proxies and geolocation spoofing can undermine IP-based access controls and threat intelligence mechanisms that rely on geographic origin. This may lead to increased exposure to fraud, espionage, or state-sponsored cyber operations. Additionally, organizations relying on VPNs for secure remote access may face challenges distinguishing legitimate from malicious VPN traffic, increasing the risk of insider threats or lateral movement by attackers. The presence of infrastructure linked to high-risk countries may also trigger regulatory and compliance concerns under European data protection and cybersecurity laws. Overall, the threat can degrade network visibility and trust, potentially impacting confidentiality, integrity, and availability of organizational assets.

Mitigation Recommendations

European organizations should implement multi-layered verification of VPN and proxy traffic origins, combining network telemetry with behavioral analytics to detect anomalies. Specifically, they should: 1) Employ advanced geolocation verification tools that cross-reference IP origin data with known residential proxy databases to identify spoofed locations. 2) Block or restrict access from IP addresses and domains linked to suspicious VPN providers and residential proxy networks, updating threat intelligence feeds regularly. 3) Monitor VPN usage patterns for unusual spikes, geographic inconsistencies, or connections from high-risk countries, integrating this data into SIEM and UEBA solutions. 4) Enforce strict authentication and endpoint security controls for VPN access to reduce risks from compromised credentials or insider threats. 5) Collaborate with national cybersecurity centers and ISPs to share intelligence on suspicious VPN infrastructure and proxy abuse. 6) Educate users about risks associated with unauthorized VPN use and implement policies restricting use of unapproved VPN services. 7) Consider network segmentation and zero-trust principles to limit lateral movement opportunities if VPN traffic is compromised. These measures go beyond generic advice by focusing on technical validation of traffic origin and proactive blocking of suspicious infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.silentpush.com/blog/traffic-origin-chinese-vpn"]
Adversary
null
Pulse Id
698af5d8f28d08f2e63399dd
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash994dfe8573747f2b90e4d32b5ae07fc6

Ip

ValueDescriptionCopy
ip194.147.16.244
ip205.198.91.136
ip205.198.91.155

Domain

ValueDescriptionCopy
domaincatixs.com
domainlcabc.icu
domainlcapi.shop
domainlcapp.bar
domainlcapp.bond
domainlcapp.cfd
domainlcapp.cyou
domainlcapp.icu
domainlcapp.my
domainlcapp.qpon
domainlcapp.sbs
domainlcapp.shop
domainlcapp.xyz
domainlcpro.bar
domainlcpro.bond
domainlcpro.cc
domainlcpro.cfd
domainlcpro.cyou
domainlcpro.icu
domainlcpro.qpon
domainlcpro.sbs
domainlcpro.shop
domainlcpro.top
domainlcpro.vip
domainlcvpn.bond
domainlcvpn.cc
domainlcvpn.cfd
domainlcvpn.cyou
domainlcvpn.qpon
domainlcvpn.sbs
domainlcvpn.shop
domainlcvpn.top
domainlcvpn.xyz
domainloopvpn.org
domainlvcha.in
domainlvcha.org
domainlvcha.qpon
domainlvcha.sbs
domainlvchaapp.bond
domainlvchaapp.cc
domainlvchaapp.cyou
domainlvchaapp.icu
domainlvchaapp.pw
domainlvchaapp.site
domainlvchaapp.store
domainlvchaapp.vip
domainlvchavpn.bond
domainlvchavpn.cfd
domainlvchavpn.one

Threat ID: 698b053e4b57a58fa1fad57f

Added to database: 2/10/2026, 10:15:26 AM

Last enriched: 2/10/2026, 10:15:40 AM

Last updated: 2/12/2026, 12:00:43 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats