#Proxyware

2026-01-20

Recent research highlights continued proxyware distribution through malware disguised as legitimate installers, including tools branded as Notepad++.

The campaign demonstrates evolving persistence techniques, including scheduled task abuse, process injection, and the use of both JavaScript and Python loaders to deploy proxy services.

This activity underscores the growing relevance of non-cryptomining monetization threats and the need for visibility into network-level resource abuse.

Follow @technadu for neutral, technically grounded cybersecurity reporting.

Source: asec.ahnlab.com/en/92183/

Thoughtful discussion encouraged.

#InfoSec #ThreatIntelligence #Proxyware #MalwareResearch #EndpointDefense #CyberThreats #SecurityAwareness

Proxyware Disguised as Notepad++ Tool
2025-08-28

Proxyware malware w popularnych serwisach do pobierania filmów z YouTube – nowa kampania cyberprzestępców

Cyberprzestępcy stają się coraz bardziej kreatywni w wymyślaniu nowych sposobów dystrybucji złośliwego oprogramowania. Najnowsza kampania, wykryta przez badaczy bezpieczeństwa z AhnLab Security Intelligence Center (ASEC) potwierdza ten trend. Tym razem, atakujący postanowili wykorzystać popularne serwisy do pobierania filmów z YouTube, w celi propagacji złośliwego oprogramowania typu proxyware. TLDR: Czym jest...

#WBiegu #Malware #Proxyware #YoutubeDownloader

sekurak.pl/proxyware-malware-w

The Spamhaus Projectspamhaus@infosec.exchange
2024-04-23

❗ Spamhaus #TicketDeskTeam has noticed an 📈 increase in removal requests from frustrated mobile phone users who can't send emails from their devices, due to their ISPs policies.

Can you guess what the ISP's in question are still doing?

Find out here ⬇
spamhaus.org/resource-hub/comp

#ISP #MobilePhoneCompanies #Proxyware #Malware #SMTPauthentication

2024-04-01

Human Security identified a cluster of VPN apps available on the Google Play Store that transformed the user’s device into a proxy node without their knowledge. They dubbed this operation PROXYLIB after the Golang library responsible for the proxy node enrollment in each of the apps. They uncovered 28 applications related to PROXYLIB. They provide background and analysis of PROXYLIB. They list the applications removed. No IOC 🔗 humansecurity.com/learn/blog/s

#proxyware #threatintel #PROXYLIB

2024-03-14

A particularly malicious practice involves compromising devices and installing #proxyware on them. The attackers infiltrate their victims’ systems without their consent and secretly install the software, making the device an unwitting exit point for the #RESIP network.

Attack scenario schema
2021-11-19

Beers with Talos, Ep. #111: We say goodbye to Craig and his killer robots - Beers with Talos (BWT) Podcast episode No. 111 is now available. Download this episode an... blog.talosintelligence.com/202 #beerswithtalos #proxyware #features

2021-08-31

Attracting flies with Honey(gain): Adversarial abuse of proxyware - By Edmund Brumaghin and Vitor Ventura.

With internet-sharing applications, or "pr... feedproxy.google.com/~r/feedbu #cryptocurrencymining. #headlines #honeygain #proxyware #malware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst