Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
Like Tree2Likes
  • 2 Post By whiteLight

Thread: ProxyBack Malware Converts Your PC Into Proxy

  1. #1
    It's Alright,You Heard?
    whiteLight's Avatar
    Reputation Points
    214616
    Reputation Power
    100
    Join Date
    Aug 2014
    Posts
    9,269
    Time Online
    462 d 3 h 45 m
    Avg. Time Online
    3 h 7 m
    Mentioned
    2378 Post(s)
    Quoted
    807 Post(s)
    Liked
    12475 times
    Feedbacks
    440 (100%)

    ProxyBack Malware Converts Your PC Into Proxy

    PALO ALTO NETWORKS RESEARCHERS HAVE IDENTIFIED A UNIQUE MALWARE THAT INFECTS HOME PCS AND TRANSFORMS THEM INTO INTERNET PROXIES USING HTTP TUNNEL.

    As per Palo Alto researchers, a Russian company’s domain is being used by attackers, which inherently is a patent Web proxy service.

    The malware has been named ProxyBack and it was firstly discovered in March 2014 but its functioning has only recently been understood by researchers.

    Palo Alto Networks experts believe that most educational institutes located in Europe have become the targets of this malware and regular home-use PCs are attacked for funneling internet traffic illegally.

    These infected PCs aren’t used to hide the location of a hacker but are advertised as trusted proxy servers listed in an online proxy service that operate from Russian outskirts.

    ProxyBack performs its task by firstly infecting a PC and creating a connection with the attacker controlled proxy server from where it receives commands and also the traffic that is to be routed to real web servers.

    Every PC that ProxyBack infects becomes a bot inside a bigger network that is already being controlled by the attackers, who then send instructions through basic HTTP requests.

    1. Until 23rd December 2015 ProxyBack has infected 11,149 computers.
    2. Every infected machine is given a unique ID parameter in the HTTP requests that are being sent from the C&C server.
    3. This number slowly gets incremented by one for every single machine.

    Though the researchers couldn’t find any reliable electronic trail to identify the perpetrators that use the buyproxy.rudomain but they have discovered that IPs of some of the infected machines did appear in their online advertisement as IPs of some of the available proxy servers.

    Jeff White from Palo Alto Networks says:

    “Whether the people behind ‘buyproxy[.]ru’ are responsible for the distribution of the ProxyBack malware or not is unknown; however, it is clear that the ProxyBack malware is designed for, and used in, their service.”

    In the past, Palo Alto researchers exposed hackers exploiting Kaspersky and Microsoft products to install snooping malware on users PCs. The firm also identified YiSpecter, WireLurker and XcodeGhost malware in iOS devices and
    DGM and nross1978 like this.

  2. #2
    DGMDonor Icon
    DGM is offline
    iLLuSioNist
    DGM's Avatar
    Reputation Points
    77147
    Reputation Power
    100
    Join Date
    Aug 2015
    Posts
    4,744
    Time Online
    204 d 20 h 52 m
    Avg. Time Online
    1 h 32 m
    Mentioned
    969 Post(s)
    Quoted
    453 Post(s)
    Liked
    4014 times
    Feedbacks
    170 (100%)
    That mean hacker found way to jump connections with real IPs
    DGM Says ! Be Busy Be Happy TI'ian. !


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •