• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity

You are here: Home / General Cyber Security News / ‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity
December 2, 2022

Menace actors have been noticed making use of criminal proxy networks to obfuscate their illegal routines by hiding behind hijacked IP addresses and applying the identical to build an look of legitimacy.

The results arrive from security researchers at DomainTools, who have stated that whilst these networks have been initially made use of as part of botnets, their worthwhile mother nature has turned them into their personal felony enterprises.

Describing the new menace in an advisory revealed on Thursday, the DomainTools crew claimed it spotted a new and especially dangerous proxy assistance known as ‘Black Proxies,’ which is getting marketed to other cyber-criminals for its reliability, scope and extensive variety of IP addresses.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Black Proxies sector on their own as getting around 1,000,000 residential and other proxy IP addresses ‘from all all over the entire world.’ The scope and scale of these new choices clearly show just how huge their claimed pool of IP room is,” DomainTools wrote.

“Upon even further assessment by the provider, their pool of IP addresses outlined in fall of 2022 ‘online’ comes in at just above 180,000 IPs, which is still a factor larger sized than the common products and services primarily based on other kinds of strategies and botnets.”

In accordance to the advisory, the Black Proxies scale is considerable simply because of not only their target on both the classic types of IP proxying but also their use of compromised internet websites for their solutions.

“Finally, in the cybercrime ecosystem, there are a host of specialised services designed to enable destructive exercise,” reads the report.

The researchers also extra that knowing these more recent destructive proxy products and services and how they facilitate the initiatives of other cyber-criminals is critical in order to overcome them.

“For defenders searching to defend their organizations and consumers from these forms of proxy network expert services, the crucial is to focus on defense in depth, implementing unique detection approaches to help detect anomalous and most likely malicious actions,” concluded the report.

Destructive domains were being also at the middle of a typosquat marketing campaign uncovered in October, which highlighted attacks targeting Windows and Android users mimicking 27 models.


Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Hackers Use Archive Files and HTML Smuggling to Bypass Detection Tools
Next Post: Google Increases Android Security With Memory-Safe Programming Languages Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.