Silent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN
An investigation using Silent Push's Traffic Origin and residential proxy data revealed a suspicious Chinese VPN provider. The analysis focused on IP address 205.198.91.155, which showed unusual traffic from Russia, China, Myanmar, Iran, and Venezuela. This IP was linked to the domain lvcha.in, hosting a Chinese-language VPN. Further investigation uncovered nearly 50 related domains promoting the same VPN, suggesting attempts to bypass country-level firewalls. The VPN's infrastructure was found to use residential proxies and had connections to various high-risk countries. This case study demonstrates the importance of verifying physical and technical behaviors of connections to protect against fraud and state-sponsored actors using stolen identities and spoofed locations.
AI Analysis
Technical Summary
This threat involves a suspicious Chinese VPN provider identified through a combined analysis of Silent Push's Traffic Origin data and residential proxy data. The investigation centered on IP address 205.198.91.155, associated with the domain lvcha.in, which hosts a Chinese-language VPN service. Nearly 50 related domains were found promoting the same VPN, suggesting a coordinated effort to evade country-level firewalls and censorship mechanisms. Traffic analysis revealed unusual connections originating from countries considered high risk or under heavy surveillance, including Russia, China, Myanmar, Iran, and Venezuela. The VPN infrastructure uses residential proxies, which are IP addresses assigned to ordinary users, to mask the true origin of traffic and complicate attribution. This technique enables geolocation spoofing and can facilitate fraudulent activities or state-sponsored operations that rely on stolen identities and spoofed locations. The campaign is tagged with MITRE ATT&CK techniques such as T1133 (External Remote Services), T1608.004 (Stage Capabilities: Proxy), T1090 (Proxy), T1584 (Compromise Infrastructure), and T1608.005 (Stage Capabilities: VPN). No known exploits are currently active in the wild, and no specific vulnerabilities or patches are identified. The medium severity rating reflects the potential for misuse in evading detection and censorship circumvention, rather than direct exploitation of software vulnerabilities. This case study highlights the importance of verifying both physical and technical behaviors of network connections to defend against fraud and sophisticated adversaries leveraging proxy and VPN infrastructure.
Potential Impact
For European organizations, this threat poses risks primarily related to network security and trustworthiness of VPN connections. Unauthorized or suspicious VPN usage can facilitate data exfiltration, bypass of security controls, and complicate attribution of malicious activity. The use of residential proxies and geolocation spoofing can undermine IP-based access controls and threat intelligence mechanisms that rely on geographic origin. This may lead to increased exposure to fraud, espionage, or state-sponsored cyber operations. Additionally, organizations relying on VPNs for secure remote access may face challenges distinguishing legitimate from malicious VPN traffic, increasing the risk of insider threats or lateral movement by attackers. The presence of infrastructure linked to high-risk countries may also trigger regulatory and compliance concerns under European data protection and cybersecurity laws. Overall, the threat can degrade network visibility and trust, potentially impacting confidentiality, integrity, and availability of organizational assets.
Mitigation Recommendations
European organizations should implement multi-layered verification of VPN and proxy traffic origins, combining network telemetry with behavioral analytics to detect anomalies. Specifically, they should: 1) Employ advanced geolocation verification tools that cross-reference IP origin data with known residential proxy databases to identify spoofed locations. 2) Block or restrict access from IP addresses and domains linked to suspicious VPN providers and residential proxy networks, updating threat intelligence feeds regularly. 3) Monitor VPN usage patterns for unusual spikes, geographic inconsistencies, or connections from high-risk countries, integrating this data into SIEM and UEBA solutions. 4) Enforce strict authentication and endpoint security controls for VPN access to reduce risks from compromised credentials or insider threats. 5) Collaborate with national cybersecurity centers and ISPs to share intelligence on suspicious VPN infrastructure and proxy abuse. 6) Educate users about risks associated with unauthorized VPN use and implement policies restricting use of unapproved VPN services. 7) Consider network segmentation and zero-trust principles to limit lateral movement opportunities if VPN traffic is compromised. These measures go beyond generic advice by focusing on technical validation of traffic origin and proactive blocking of suspicious infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 994dfe8573747f2b90e4d32b5ae07fc6
- ip: 194.147.16.244
- ip: 205.198.91.136
- ip: 205.198.91.155
- domain: catixs.com
- domain: lcabc.icu
- domain: lcapi.shop
- domain: lcapp.bar
- domain: lcapp.bond
- domain: lcapp.cfd
- domain: lcapp.cyou
- domain: lcapp.icu
- domain: lcapp.my
- domain: lcapp.qpon
- domain: lcapp.sbs
- domain: lcapp.shop
- domain: lcapp.xyz
- domain: lcpro.bar
- domain: lcpro.bond
- domain: lcpro.cc
- domain: lcpro.cfd
- domain: lcpro.cyou
- domain: lcpro.icu
- domain: lcpro.qpon
- domain: lcpro.sbs
- domain: lcpro.shop
- domain: lcpro.top
- domain: lcpro.vip
- domain: lcvpn.bond
- domain: lcvpn.cc
- domain: lcvpn.cfd
- domain: lcvpn.cyou
- domain: lcvpn.qpon
- domain: lcvpn.sbs
- domain: lcvpn.shop
- domain: lcvpn.top
- domain: lcvpn.xyz
- domain: loopvpn.org
- domain: lvcha.in
- domain: lvcha.org
- domain: lvcha.qpon
- domain: lvcha.sbs
- domain: lvchaapp.bond
- domain: lvchaapp.cc
- domain: lvchaapp.cyou
- domain: lvchaapp.icu
- domain: lvchaapp.pw
- domain: lvchaapp.site
- domain: lvchaapp.store
- domain: lvchaapp.vip
- domain: lvchavpn.bond
- domain: lvchavpn.cfd
- domain: lvchavpn.one
Silent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN
Description
An investigation using Silent Push's Traffic Origin and residential proxy data revealed a suspicious Chinese VPN provider. The analysis focused on IP address 205.198.91.155, which showed unusual traffic from Russia, China, Myanmar, Iran, and Venezuela. This IP was linked to the domain lvcha.in, hosting a Chinese-language VPN. Further investigation uncovered nearly 50 related domains promoting the same VPN, suggesting attempts to bypass country-level firewalls. The VPN's infrastructure was found to use residential proxies and had connections to various high-risk countries. This case study demonstrates the importance of verifying physical and technical behaviors of connections to protect against fraud and state-sponsored actors using stolen identities and spoofed locations.
AI-Powered Analysis
Technical Analysis
This threat involves a suspicious Chinese VPN provider identified through a combined analysis of Silent Push's Traffic Origin data and residential proxy data. The investigation centered on IP address 205.198.91.155, associated with the domain lvcha.in, which hosts a Chinese-language VPN service. Nearly 50 related domains were found promoting the same VPN, suggesting a coordinated effort to evade country-level firewalls and censorship mechanisms. Traffic analysis revealed unusual connections originating from countries considered high risk or under heavy surveillance, including Russia, China, Myanmar, Iran, and Venezuela. The VPN infrastructure uses residential proxies, which are IP addresses assigned to ordinary users, to mask the true origin of traffic and complicate attribution. This technique enables geolocation spoofing and can facilitate fraudulent activities or state-sponsored operations that rely on stolen identities and spoofed locations. The campaign is tagged with MITRE ATT&CK techniques such as T1133 (External Remote Services), T1608.004 (Stage Capabilities: Proxy), T1090 (Proxy), T1584 (Compromise Infrastructure), and T1608.005 (Stage Capabilities: VPN). No known exploits are currently active in the wild, and no specific vulnerabilities or patches are identified. The medium severity rating reflects the potential for misuse in evading detection and censorship circumvention, rather than direct exploitation of software vulnerabilities. This case study highlights the importance of verifying both physical and technical behaviors of network connections to defend against fraud and sophisticated adversaries leveraging proxy and VPN infrastructure.
Potential Impact
For European organizations, this threat poses risks primarily related to network security and trustworthiness of VPN connections. Unauthorized or suspicious VPN usage can facilitate data exfiltration, bypass of security controls, and complicate attribution of malicious activity. The use of residential proxies and geolocation spoofing can undermine IP-based access controls and threat intelligence mechanisms that rely on geographic origin. This may lead to increased exposure to fraud, espionage, or state-sponsored cyber operations. Additionally, organizations relying on VPNs for secure remote access may face challenges distinguishing legitimate from malicious VPN traffic, increasing the risk of insider threats or lateral movement by attackers. The presence of infrastructure linked to high-risk countries may also trigger regulatory and compliance concerns under European data protection and cybersecurity laws. Overall, the threat can degrade network visibility and trust, potentially impacting confidentiality, integrity, and availability of organizational assets.
Mitigation Recommendations
European organizations should implement multi-layered verification of VPN and proxy traffic origins, combining network telemetry with behavioral analytics to detect anomalies. Specifically, they should: 1) Employ advanced geolocation verification tools that cross-reference IP origin data with known residential proxy databases to identify spoofed locations. 2) Block or restrict access from IP addresses and domains linked to suspicious VPN providers and residential proxy networks, updating threat intelligence feeds regularly. 3) Monitor VPN usage patterns for unusual spikes, geographic inconsistencies, or connections from high-risk countries, integrating this data into SIEM and UEBA solutions. 4) Enforce strict authentication and endpoint security controls for VPN access to reduce risks from compromised credentials or insider threats. 5) Collaborate with national cybersecurity centers and ISPs to share intelligence on suspicious VPN infrastructure and proxy abuse. 6) Educate users about risks associated with unauthorized VPN use and implement policies restricting use of unapproved VPN services. 7) Consider network segmentation and zero-trust principles to limit lateral movement opportunities if VPN traffic is compromised. These measures go beyond generic advice by focusing on technical validation of traffic origin and proactive blocking of suspicious infrastructure.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.silentpush.com/blog/traffic-origin-chinese-vpn"]
- Adversary
- null
- Pulse Id
- 698af5d8f28d08f2e63399dd
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash994dfe8573747f2b90e4d32b5ae07fc6 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip194.147.16.244 | — | |
ip205.198.91.136 | — | |
ip205.198.91.155 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincatixs.com | — | |
domainlcabc.icu | — | |
domainlcapi.shop | — | |
domainlcapp.bar | — | |
domainlcapp.bond | — | |
domainlcapp.cfd | — | |
domainlcapp.cyou | — | |
domainlcapp.icu | — | |
domainlcapp.my | — | |
domainlcapp.qpon | — | |
domainlcapp.sbs | — | |
domainlcapp.shop | — | |
domainlcapp.xyz | — | |
domainlcpro.bar | — | |
domainlcpro.bond | — | |
domainlcpro.cc | — | |
domainlcpro.cfd | — | |
domainlcpro.cyou | — | |
domainlcpro.icu | — | |
domainlcpro.qpon | — | |
domainlcpro.sbs | — | |
domainlcpro.shop | — | |
domainlcpro.top | — | |
domainlcpro.vip | — | |
domainlcvpn.bond | — | |
domainlcvpn.cc | — | |
domainlcvpn.cfd | — | |
domainlcvpn.cyou | — | |
domainlcvpn.qpon | — | |
domainlcvpn.sbs | — | |
domainlcvpn.shop | — | |
domainlcvpn.top | — | |
domainlcvpn.xyz | — | |
domainloopvpn.org | — | |
domainlvcha.in | — | |
domainlvcha.org | — | |
domainlvcha.qpon | — | |
domainlvcha.sbs | — | |
domainlvchaapp.bond | — | |
domainlvchaapp.cc | — | |
domainlvchaapp.cyou | — | |
domainlvchaapp.icu | — | |
domainlvchaapp.pw | — | |
domainlvchaapp.site | — | |
domainlvchaapp.store | — | |
domainlvchaapp.vip | — | |
domainlvchavpn.bond | — | |
domainlvchavpn.cfd | — | |
domainlvchavpn.one | — |
Threat ID: 698b053e4b57a58fa1fad57f
Added to database: 2/10/2026, 10:15:26 AM
Last enriched: 2/10/2026, 10:15:40 AM
Last updated: 2/12/2026, 12:00:43 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
The game is over: when “free” comes at too high a price. What we know about RenEngine
MediumA Peek Into Muddled Libra's Operational Playbook
MediumInvestigation on the EmEditor Supply Chain Cyberattack
MediumCryptocurrency Sector Targeted with New Tooling and AI-Enabled Social Engineering
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.