Silent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN
An investigation using Silent Push's Traffic Origin and residential proxy data revealed a suspicious Chinese VPN provider. The analysis focused on IP address 205.198.91.155, which showed unusual traffic from Russia, China, Myanmar, Iran, and Venezuela. This IP was linked to the domain lvcha.in, hosting a Chinese-language VPN. Further investigation uncovered nearly 50 related domains promoting the same VPN, suggesting attempts to bypass country-level firewalls. The VPN's infrastructure was found to use residential proxies and had connections to various high-risk countries. This case study demonstrates the importance of verifying physical and technical behaviors of connections to protect against fraud and state-sponsored actors using stolen identities and spoofed locations.
AI Analysis
Technical Summary
This threat involves a suspicious Chinese VPN provider identified through a combined analysis of Silent Push Traffic Origin data and residential proxy intelligence. The investigation centered on IP address 205.198.91.155, linked to the domain lvcha.in, which hosts a Chinese-language VPN service. Nearly 50 additional domains promoting the same VPN were discovered, suggesting a coordinated effort to circumvent country-level firewalls and censorship. The VPN infrastructure leverages residential proxies, which are IP addresses assigned to ordinary consumer devices, to mask its true origin and evade detection. Traffic analysis revealed unusual patterns originating from high-risk countries such as Russia, China, Myanmar, Iran, and Venezuela, indicating potential use by state-sponsored threat actors or fraudsters employing geolocation spoofing and stolen identities. The campaign aligns with tactics including T1090 (proxy), T1133 (external remote services), T1584 (compromise infrastructure), and T1608 (state-sponsored). Although no direct exploits or malware have been observed, the use of residential proxies and multiple domains complicates attribution and detection. This case underscores the necessity for organizations to verify both physical and technical connection attributes to defend against sophisticated evasion techniques and fraud. The threat does not target specific software versions and lacks known exploits in the wild, but its infrastructure could facilitate future malicious activities.
Potential Impact
The primary impact of this threat lies in its potential to undermine geolocation-based security controls and network filtering mechanisms. Organizations relying on IP-based geofencing or country-level firewall rules may be deceived by the VPN's use of residential proxies and spoofed traffic origins, allowing threat actors to bypass restrictions and gain unauthorized access. This can facilitate fraud, data exfiltration, or reconnaissance by state-sponsored groups or cybercriminals. Additionally, the presence of multiple domains and proxy infrastructure increases the complexity of detection and mitigation efforts, potentially leading to prolonged exposure. While no direct malware or exploits are currently linked to this VPN, its infrastructure could be leveraged for future attacks, including command and control communication or lateral movement within networks. The threat also poses reputational risks for organizations if their networks are used as proxies or if they inadvertently allow malicious traffic. Overall, the impact is moderate but significant for entities with strict geolocation policies or those targeted by nation-state adversaries.
Mitigation Recommendations
To mitigate this threat, organizations should implement advanced network traffic analysis capable of detecting anomalies associated with residential proxy usage and geolocation spoofing. This includes correlating IP reputation data with behavioral indicators and employing threat intelligence feeds that identify suspicious VPN domains and IPs. Network segmentation and strict access controls can limit exposure if unauthorized VPN traffic is detected. Deploying multi-factor authentication and continuous user behavior analytics helps reduce risks from compromised credentials or spoofed identities. Organizations should also regularly update firewall and proxy configurations to block known malicious IP ranges and domains linked to this VPN infrastructure. Collaboration with threat intelligence providers to receive timely updates on emerging proxy networks and suspicious VPN services is essential. Finally, educating security teams on the tactics used by state-sponsored actors to evade detection will improve incident response capabilities.
Affected Countries
China, Russia, Myanmar, Iran, Venezuela, United States, India, Brazil, South Africa
Indicators of Compromise
- hash: 994dfe8573747f2b90e4d32b5ae07fc6
- ip: 194.147.16.244
- ip: 205.198.91.136
- ip: 205.198.91.155
- domain: catixs.com
- domain: lcabc.icu
- domain: lcapi.shop
- domain: lcapp.bar
- domain: lcapp.bond
- domain: lcapp.cfd
- domain: lcapp.cyou
- domain: lcapp.icu
- domain: lcapp.my
- domain: lcapp.qpon
- domain: lcapp.sbs
- domain: lcapp.shop
- domain: lcapp.xyz
- domain: lcpro.bar
- domain: lcpro.bond
- domain: lcpro.cc
- domain: lcpro.cfd
- domain: lcpro.cyou
- domain: lcpro.icu
- domain: lcpro.qpon
- domain: lcpro.sbs
- domain: lcpro.shop
- domain: lcpro.top
- domain: lcpro.vip
- domain: lcvpn.bond
- domain: lcvpn.cc
- domain: lcvpn.cfd
- domain: lcvpn.cyou
- domain: lcvpn.qpon
- domain: lcvpn.sbs
- domain: lcvpn.shop
- domain: lcvpn.top
- domain: lcvpn.xyz
- domain: loopvpn.org
- domain: lvcha.in
- domain: lvcha.org
- domain: lvcha.qpon
- domain: lvcha.sbs
- domain: lvchaapp.bond
- domain: lvchaapp.cc
- domain: lvchaapp.cyou
- domain: lvchaapp.icu
- domain: lvchaapp.pw
- domain: lvchaapp.site
- domain: lvchaapp.store
- domain: lvchaapp.vip
- domain: lvchavpn.bond
- domain: lvchavpn.cfd
- domain: lvchavpn.one
Silent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN
Description
An investigation using Silent Push's Traffic Origin and residential proxy data revealed a suspicious Chinese VPN provider. The analysis focused on IP address 205.198.91.155, which showed unusual traffic from Russia, China, Myanmar, Iran, and Venezuela. This IP was linked to the domain lvcha.in, hosting a Chinese-language VPN. Further investigation uncovered nearly 50 related domains promoting the same VPN, suggesting attempts to bypass country-level firewalls. The VPN's infrastructure was found to use residential proxies and had connections to various high-risk countries. This case study demonstrates the importance of verifying physical and technical behaviors of connections to protect against fraud and state-sponsored actors using stolen identities and spoofed locations.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a suspicious Chinese VPN provider identified through a combined analysis of Silent Push Traffic Origin data and residential proxy intelligence. The investigation centered on IP address 205.198.91.155, linked to the domain lvcha.in, which hosts a Chinese-language VPN service. Nearly 50 additional domains promoting the same VPN were discovered, suggesting a coordinated effort to circumvent country-level firewalls and censorship. The VPN infrastructure leverages residential proxies, which are IP addresses assigned to ordinary consumer devices, to mask its true origin and evade detection. Traffic analysis revealed unusual patterns originating from high-risk countries such as Russia, China, Myanmar, Iran, and Venezuela, indicating potential use by state-sponsored threat actors or fraudsters employing geolocation spoofing and stolen identities. The campaign aligns with tactics including T1090 (proxy), T1133 (external remote services), T1584 (compromise infrastructure), and T1608 (state-sponsored). Although no direct exploits or malware have been observed, the use of residential proxies and multiple domains complicates attribution and detection. This case underscores the necessity for organizations to verify both physical and technical connection attributes to defend against sophisticated evasion techniques and fraud. The threat does not target specific software versions and lacks known exploits in the wild, but its infrastructure could facilitate future malicious activities.
Potential Impact
The primary impact of this threat lies in its potential to undermine geolocation-based security controls and network filtering mechanisms. Organizations relying on IP-based geofencing or country-level firewall rules may be deceived by the VPN's use of residential proxies and spoofed traffic origins, allowing threat actors to bypass restrictions and gain unauthorized access. This can facilitate fraud, data exfiltration, or reconnaissance by state-sponsored groups or cybercriminals. Additionally, the presence of multiple domains and proxy infrastructure increases the complexity of detection and mitigation efforts, potentially leading to prolonged exposure. While no direct malware or exploits are currently linked to this VPN, its infrastructure could be leveraged for future attacks, including command and control communication or lateral movement within networks. The threat also poses reputational risks for organizations if their networks are used as proxies or if they inadvertently allow malicious traffic. Overall, the impact is moderate but significant for entities with strict geolocation policies or those targeted by nation-state adversaries.
Mitigation Recommendations
To mitigate this threat, organizations should implement advanced network traffic analysis capable of detecting anomalies associated with residential proxy usage and geolocation spoofing. This includes correlating IP reputation data with behavioral indicators and employing threat intelligence feeds that identify suspicious VPN domains and IPs. Network segmentation and strict access controls can limit exposure if unauthorized VPN traffic is detected. Deploying multi-factor authentication and continuous user behavior analytics helps reduce risks from compromised credentials or spoofed identities. Organizations should also regularly update firewall and proxy configurations to block known malicious IP ranges and domains linked to this VPN infrastructure. Collaboration with threat intelligence providers to receive timely updates on emerging proxy networks and suspicious VPN services is essential. Finally, educating security teams on the tactics used by state-sponsored actors to evade detection will improve incident response capabilities.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.silentpush.com/blog/traffic-origin-chinese-vpn"]
- Adversary
- null
- Pulse Id
- 698af5d8f28d08f2e63399dd
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash994dfe8573747f2b90e4d32b5ae07fc6 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip194.147.16.244 | — | |
ip205.198.91.136 | — | |
ip205.198.91.155 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincatixs.com | — | |
domainlcabc.icu | — | |
domainlcapi.shop | — | |
domainlcapp.bar | — | |
domainlcapp.bond | — | |
domainlcapp.cfd | — | |
domainlcapp.cyou | — | |
domainlcapp.icu | — | |
domainlcapp.my | — | |
domainlcapp.qpon | — | |
domainlcapp.sbs | — | |
domainlcapp.shop | — | |
domainlcapp.xyz | — | |
domainlcpro.bar | — | |
domainlcpro.bond | — | |
domainlcpro.cc | — | |
domainlcpro.cfd | — | |
domainlcpro.cyou | — | |
domainlcpro.icu | — | |
domainlcpro.qpon | — | |
domainlcpro.sbs | — | |
domainlcpro.shop | — | |
domainlcpro.top | — | |
domainlcpro.vip | — | |
domainlcvpn.bond | — | |
domainlcvpn.cc | — | |
domainlcvpn.cfd | — | |
domainlcvpn.cyou | — | |
domainlcvpn.qpon | — | |
domainlcvpn.sbs | — | |
domainlcvpn.shop | — | |
domainlcvpn.top | — | |
domainlcvpn.xyz | — | |
domainloopvpn.org | — | |
domainlvcha.in | — | |
domainlvcha.org | — | |
domainlvcha.qpon | — | |
domainlvcha.sbs | — | |
domainlvchaapp.bond | — | |
domainlvchaapp.cc | — | |
domainlvchaapp.cyou | — | |
domainlvchaapp.icu | — | |
domainlvchaapp.pw | — | |
domainlvchaapp.site | — | |
domainlvchaapp.store | — | |
domainlvchaapp.vip | — | |
domainlvchavpn.bond | — | |
domainlvchavpn.cfd | — | |
domainlvchavpn.one | — |
Threat ID: 698b053e4b57a58fa1fad57f
Added to database: 2/10/2026, 10:15:26 AM
Last enriched: 3/12/2026, 6:45:11 PM
Last updated: 3/29/2026, 4:23:10 AM
Views: 129
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.