A new piece of malware dubbed
The malware hides malicious network traffic using SOCKS5 proxies that set up on compromised PCs.
The use of SOCKS5 proxies was observed several times by malware researchers, it allows to avoid detection bypassing security measures that identify malicious traffic. SOCKS5 proxies also allow hiding Command & Control servers making takedowns.
The most recently analyzed
The experts spotted a variant of the
Another campaign from June 6 was dropping a PowerEnum PowerShell script that threat actors use for device fingerprinting and data
In July, experts discovered a new sample of the
“Since this proxy malware was being used in multiple separate campaigns, Proofpoint researchers believe it was very likely that it was being sold in an underground marketplace.” continues the analysis. “Moreover, we found an advertisement from April 2, 2019, on an underground forum that described a malware named “socks5
Researchers at Proofpoint believe that the proxy malware is available for sale via an underground marketplace, an advertisement on a Russian crime forum promotes a malware called “socks5
“The synergy between SystemBC as a malicious proxy and mainstream malware creates new challenges for defenders relying on network edge detections to intercept and mitigate threats like banking Trojans.” concludes the report that also includes IoCs and other details.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.