China's state-backed groups are deploying covert networks of compromised devices to execute attacks using low-cost, low-risk, and deniable methods. This approach suggests a strategic shift toward sustainable cyber operations with reduced attribution exposure.