US govt sanctions cybercrime gang behind massive 911 S5 botnet

May 28, 2024 at 05:06PM The U.S. Treasury Department sanctioned a cybercrime network involving Chinese nationals and Thai companies connected to the “911 S5” botnet, which compromised millions of IP addresses. The network enabled cybercriminals to commit fraud and make bomb threats. Key individuals and entities have been sanctioned, prohibiting transactions and exposing violators to … Read more

US govt sanctions cybercrime gang behind massive 911 S5 botnet

May 28, 2024 at 03:08PM The U.S. Treasury Department sanctioned a cybercrime network involving Chinese nationals and Thai companies linked to the “911 S5” botnet, which compromised 19 million IP addresses. The botnet facilitated cybercrimes, including fraudulent applications and bomb threats. Sanctions were imposed on individuals and entities involved, prohibiting transactions with U.S. interests and … Read more

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

April 28, 2024 at 10:30AM Okta has reported a significant increase in credential stuffing attacks, facilitated by residential proxy services and stolen credentials. Cisco also cautioned of a surge in brute-force attacks targeting various devices. These attacks appear to originate from TOR exit nodes and anonymizing services. Okta recommends enforcing strong passwords, enabling two-factor authentication, … Read more

VPN Apps on Google Play Turn Android Devices Into Proxies

March 27, 2024 at 10:54AM Numerous VPN apps turned Android devices into residential proxies and made their way into the Google Play store, containing a malicious library responsible for enrolling devices as proxy nodes and linked to Asocks, a residential proxy seller. The malicious functionality could be added to any APK through the LumiApps SDK. … Read more

How to Analyze Malware’s Network Traffic in A Sandbox

December 13, 2023 at 07:12AM Malware analysis involves examining network traffic and overcoming common challenges. Tools like a man-in-the-middle (MITM) proxy aid in decrypting HTTPS traffic, revealing details of malicious activities. FakeNET can identify malware families, and a residential proxy helps bypass geo-restrictions for analyzing evasive malware. Utilize these tools in the cloud-based ANY.RUN sandbox … Read more