• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • KeepSolid SmartDNS: Lifetime Subscription for $59

    KeepSolid SmartDNS: Lifetime Subscription for $59
  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $89

    VPN Unlimited: Lifetime Subscription for $89
  • Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399

    Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399
  • Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

    Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

Sep 1, 2021 by iHash Leave a Comment

Threat actors are capitalizing on the growing popularity of proxyware platforms like Honeygain and Nanowire to monetize their own malware campaigns, once again illustrating how attackers are quick to repurpose and weaponize legitimate platforms to their advantage.

“Malware is currently leveraging these platforms to monetize the internet bandwidth of victims, similar to how malicious cryptocurrency mining attempts to monetize the CPU cycles of infected systems,” researchers from Cisco Talos said in a Tuesday analysis. “In many cases, these applications are featured in multi-stage, multi-payload malware attacks that provide adversaries with multiple monetization methods.”

Proxyware, also called internet-sharing applications, are legitimate services that allow users to carve out a percentage of their internet bandwidth for other devices, often for a fee, through a client application offered by the provider, enabling other customers to access the internet using the internet connections offered by nodes on the network. For consumers, such services are “advertised as a means to circumvent geolocation checks on streaming or gaming platforms while generating some income for the user offering up their bandwidth,” the researchers explained.

But the illicit use of proxyware also introduces a multitude of risks in that they could permit threat actors to obfuscate the source of their attacks, thereby not only giving them the ability to perform malicious actions by making it appear as if they are originating from legitimate residential or corporate networks, but also render ineffective conventional network defenses that rely on IP-based blocklists.

“The same mechanisms currently used to monitor and track Tor exit nodes, “anonymous” proxies, and other common traffic obfuscation techniques do not currently exist for tracking nodes within these proxyware networks,” the researchers noted.

That’s not all. Researchers identified several techniques adopted by bad actors, including trojanized proxyware installers that allow for stealthy distribution of information stealers and remote access trojans (RATs) without the victims’ knowledge. In one instance observed by Cisco Talos, attackers were found using the proxyware applications to monetize victims’ network bandwidth to generate revenue as well as exploit the compromised machine’s CPU resources for mining cryptocurrency.

Another case involved a multi-stage malware campaign that culminated in the deployment of an info-stealer, a cryptocurrency mining payload, as well as proxyware software, underscoring the “varied approaches available to adversaries,” who can now go beyond cryptojacking to also plunder valuable data and monetize successful infections in other ways.

Even more concerningly, researchers detected malware that was used to silently install Honeygain on infected systems, and register the client with the adversary’s Honeygain account to profit off the victim’s internet bandwidth. This also means that an attacker can sign up for multiple Honeygain accounts to scale their operation based on the number of infected systems under their control.

“For organizations, these platforms pose two essential problems: The abuse of their resources, eventually being blocklisted due to activities they don’t even control and it increases organizations’ attack surface, potentially creating an initial attack vector directly on the endpoint,” the researchers concluded. “Due to the various risks associated with these platforms, it is recommended that organizations consider prohibiting the use of these applications on corporate assets.”

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Abusing, campaigns, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, cybercriminals, data breach, hacker news, hacking news, how to hack, information security, InternetSharing, Malware, Monetize, network security, ransomware malware, Services, software vulnerability, the hacker news

Special Offers

  • KeepSolid SmartDNS: Lifetime Subscription for $59

    KeepSolid SmartDNS: Lifetime Subscription for $59
  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $89

    VPN Unlimited: Lifetime Subscription for $89
  • Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399

    Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399
  • Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

    Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Dotan Horovits

From Spotify to Open Source: The Backstory of Backstage

Jun 5, 2023 By iHash

Heard on the Street – 6/5/2023

Jun 5, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

KeepSolid SmartDNS: Lifetime Subscription for $59

Expires June 05, 2024 23:59 PST Buy now and get 70% off KEY FEATURES Seamless streaming made possible! SmartDNS is a solution to bypass geo-restrictions and access regionally blocked content on various streaming platforms and video services. By redirecting DNS queries through their SmartDNS servers, users can unlock access to content that is typically unavailable […]

Passwarden PW Manager Lifetime Subscription for $79

Expires June 04, 2024 23:59 PST Buy now and get 60% off KEY FEATURES Safe password manager for those who value security! Passwarden is a secure password manager that simplifies and strengthens your digital life by securely storing and managing all your passwords in one place. It utilizes strong AES-256 encryption algorithms to protect your […]

VPN Unlimited: Lifetime Subscription for $89

Expires June 04, 2024 23:59 PST Buy now and get 55% off KEY FEATURES VPN Unlimited is the ultimate solution for enhancing your online security and privacy. With top-notch encryption algorithms and over 3000 secure servers in 80+ locations worldwide, it effectively masks your IP address and protects your sensitive information from prying eyes. Whether […]

Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

Expires May 05, 2123 18:30 PST Buy now and get 19% off KEY FEATURES The Dell Optiplex 7060 Micro Desktop is a solid workstation that is suitable for both home and business computing. it’s powered by Intel Core i7-8700T (8th Generation) with 2.4 GHz processor speed, making every task a breeze. It also comes with […]

Anker 313 Power Bank (PowerCore 10K) for $27

Expires May 30, 2123 05:12 PST Buy now and get 0% off PRODUCT SPECS Quality Throughout:Built adventure-tier touch with superior durability and scratch resistance, Anker 313 Power Bank (PowerCore 10K) is premium both inside and out. Slim Size, Big Power:One of the slimmest and lightest 10,000mAh portable chargers on the market. Provides 2.25 charges for […]

Secrets to successful engineering leadership from Elastic’s Simona Posea

Secrets to successful engineering leadership from Elastic’s Simona Posea

For Simona Posea, visualizing a career in technology came easily. “My mother was a role model, as she’s been working with computers since punch cards were a thing,” Simona laughs. “We had our first PC when I was six years old, and she taught us how to operate it. At the time, I would use […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT