Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices

December 9, 2024 at 07:07AM

A botnet named Socks5Systemz operates the malicious proxy service PROXY.AM, enabling cybercriminals to mask their activities. Recent findings reveal its resurgence after losing control of its initial version. Meanwhile, the Gafgyt malware targets misconfigured Docker API servers, emphasizing the risks of cloud misconfigurations and the need for better security practices.

**Meeting Takeaways:**

1. **New Malware Discovery:**
– A malicious botnet named **Socks5Systemz** is operating a proxy service called **PROXY.AM**, identified by Bitsight.
– This botnet adds layers of anonymity to cybercriminal activities, facilitating a variety of malicious actions.

2. **Relation to Other Malware:**
– The disclosure follows revelations about another malware, **Ngioweb**, which is used to turn compromised systems into proxy servers for **NSOCKS**.

3. **Botnet History and Function:**
– Socks5Systemz was first marketed in the cybercrime underground in **March 2013**.
– Its primary aim is to convert infected systems into proxy exit nodes, which are sold to cybercriminals.

4. **Infection Hotspots:**
– The countries most affected (in order of infection) include:
– India, Indonesia, Ukraine, Algeria, Vietnam, Russia, Turkey, Brazil, Mexico, Pakistan, Thailand, Philippines, Colombia, Egypt, U.S., Argentina, Bangladesh, Morocco, and Nigeria.

5. **Botnet Size and Changes:**
– By **January 2024**, it was projected that the botnet’s size would reach an average of **250,000 machines**. Current estimates suggest it has around **85,000 to 100,000** infected hosts.
– PROXY.AM claims to operate approximately **80,888 proxy nodes** from **31 different countries**.
– The botnet underwent a significant change in December 2023, leading to the development of **Socks5Systemz V2**.

6. **Service Offerings of PROXY.AM:**
– PROXY.AM provides subscription plans ranging from **$126 to $700/month** for anonymous proxy services.

7. **Cloud Misconfigurations and Threats:**
– **Gafgyt botnet malware** is exploiting misconfigured **Docker Remote API servers** for DDoS attacks.
– The discovery indicates a shift in tactics to include targeting weak SSH passwords and publicly exposed services.

8. **Security Risks from Misconfigurations:**
– A study revealed **215 instances** exposing sensitive credentials with potential unauthorized access to critical services.
– Most affected sectors include **IT, retail, finance, education, media,** and **healthcare**, primarily located in the U.S., India, Australia, Great Britain, Brazil, and South Korea.

9. **Call to Action:**
– The findings highlight the urgent need for improved system administration to avoid data leaks and potential severe impacts on organizational security.

These takeaways summarize the essential points regarding the emergence of Socks5Systemz, its operational tactics, related threats, and the significant security implications stemming from cloud misconfigurations.

Full Article