
"Residential proxy networks have become a pervasive tool for everything from high-end espionage to massive criminal schemes,"
"By routing traffic through a person's home internet connection, attackers can hide in plain sight while infiltrating corporate environments. By taking down the infrastructure used to run the IPIDEA network, we have effectively pulled the rug out from under a global marketplace that was selling access to millions of hijacked consumer devices."
"It advertised itself as the "world's leading provider of IP proxy" with more than 6.1 million daily updated IP addresses and 69,000 daily new IP addresses."
Google and partners took legal action to seize dozens of domains used to control devices and route proxy traffic, rendering IPIDEA's website inaccessible. IPIDEA advertised over 6.1 million daily updated IP addresses and 69,000 daily new IPs. Residential proxy networks route traffic through home internet connections, enabling attackers to hide while infiltrating corporate environments. IPIDEA's infrastructure was used by more than 550 distinct threat groups for cybercrime, espionage, APT activity, and information operations originating from multiple countries. Threat activities included access to victim SaaS and on-premises infrastructure and password spray attacks. Synthient analysis showed AISURU/Kimwolf actors abused flaws in residential proxy services to relay commands to vulnerable IoT devices.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]