Fake 7-Zip downloads are turning home PCs into proxy nodes

A convincing lookalike of the popular 7-Zip archiver site has been silently turning victims’ machines into residential proxy nodes.

Malwarebytes

Recent research highlights continued proxyware distribution through malware disguised as legitimate installers, including tools branded as Notepad++.

The campaign demonstrates evolving persistence techniques, including scheduled task abuse, process injection, and the use of both JavaScript and Python loaders to deploy proxy services.

This activity underscores the growing relevance of non-cryptomining monetization threats and the need for visibility into network-level resource abuse.

Follow @technadu for neutral, technically grounded cybersecurity reporting.

Source: https://asec.ahnlab.com/en/92183/

Thoughtful discussion encouraged.

#InfoSec #ThreatIntelligence #Proxyware #MalwareResearch #EndpointDefense #CyberThreats #SecurityAwareness

Proxyware malware w popularnych serwisach do pobierania filmów z YouTube – nowa kampania cyberprzestępców

Cyberprzestępcy stają się coraz bardziej kreatywni w wymyślaniu nowych sposobów dystrybucji złośliwego oprogramowania. Najnowsza kampania, wykryta przez badaczy bezpieczeństwa z AhnLab Security Intelligence Center (ASEC) potwierdza ten trend. Tym razem, atakujący postanowili wykorzystać popularne serwisy do pobierania filmów z YouTube, w celi propagacji złośliwego oprogramowania typu proxyware. TLDR: Czym jest...

#WBiegu #Malware #Proxyware #YoutubeDownloader

https://sekurak.pl/proxyware-malware-w-popularnych-serwisach-do-pobierania-filmow-z-youtube-nowa-kampania-cyberprzestepcow/

Proxyware malware w popularnych serwisach do pobierania filmów z YouTube - nowa kampania cyberprzestępców

Cyberprzestępcy stają się coraz bardziej kreatywni w wymyślaniu nowych sposobów dystrybucji złośliwego oprogramowania. Najnowsza kampania, wykryta przez badaczy bezpieczeństwa z AhnLab Security Intelligence Center (ASEC) potwierdza ten trend. Tym razem, atakujący postanowili wykorzystać popularne serwisy do pobierania filmów z YouTube, w celi propagacji złośliwego oprogramowania typu proxyware. TLDR: Czym jest...

Sekurak

❗ Spamhaus #TicketDeskTeam has noticed an 📈 increase in removal requests from frustrated mobile phone users who can't send emails from their devices, due to their ISPs policies.

Can you guess what the ISP's in question are still doing?

Find out here ⬇
https://www.spamhaus.org/resource-hub/compromised/spammers-love-mobile-phone-ip-space-heres-how-to-fix-that/

#ISP #MobilePhoneCompanies #Proxyware #Malware #SMTPauthentication

Compromised | Spammers Love Mobile Phone IP Space. Here’s How to Fix That. | Spamhaus

Mobile phone companies are leaving the door wide open for spammers to infect their customers mobile devices with proxyware and malware. Here's how they need to fix it - learn more.

The Spamhaus Project

Human Security identified a cluster of VPN apps available on the Google Play Store that transformed the user’s device into a proxy node without their knowledge. They dubbed this operation PROXYLIB after the Golang library responsible for the proxy node enrollment in each of the apps. They uncovered 28 applications related to PROXYLIB. They provide background and analysis of PROXYLIB. They list the applications removed. No IOC 🔗 https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib-and-lumiapps-transform-mobile-devices-into-proxy-nodes

#proxyware #threatintel #PROXYLIB

Satori Threat Intelligence Alert: PROXYLIB and LumiApps Transform Mobile Devices into Proxy Nodes

HUMAN's Satori Threat Intelligence team uncovered a group of 28 apps that turned user devices into residential proxy nodes.

HUMAN
A particularly malicious practice involves compromising devices and installing #proxyware on them. The attackers infiltrate their victims’ systems without their consent and secretly install the software, making the device an unwitting exit point for the #RESIP network.
Hijacking Your Bandwidth How Proxyware Apps Open You Up to Risk

In this investigation, we have analyzed several prominent

Trend Micro
Cybercrime, proxyware sfruttati per trarre profitti illecitamente

Tempo di lettura: 2 minuti. Ecco come gli attori malevoli si introducono nelle reti proxyware per sfruttarle a proprio vantaggio

Matrice Digitale
Beers with Talos, Ep. #111: We say goodbye to Craig and his killer robots - Beers with Talos (BWT) Podcast episode No. 111 is now available. Download this episode an... http://blog.talosintelligence.com/2021/11/beers-with-talos-ep-111-we-say-goodbye.html #beerswithtalos #proxyware #features
Beers with Talos, Ep. #111: We say goodbye to Craig and his killer robots

A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group

Attracting flies with Honey(gain): Adversarial abuse of proxyware - By Edmund Brumaghin and Vitor Ventura.

With internet-sharing applications, or "pr... http://feedproxy.google.com/~r/feedburner/Talos/~3/ysiubjcJXoc/proxyware-abuse.html #cryptocurrencymining. #headlines #honeygain #proxyware #malware

Attracting flies with Honey(gain): Adversarial abuse of proxyware

A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group