Remove Cybercrime Remove DDOS Remove Information Security Remove VPN
article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Proxy services can be used in a legitimate manner for several business purposes — such as price comparisons or sales intelligence — but they are massively abused for hiding cybercrime activity because they make it difficult to trace malicious traffic to its original source. SocksEscort began in 2009 as “ super-socks[.]com com , segate[.]org

Malware 203
article thumbnail

Crooks target Ukraine’s IT Army with a tainted DDoS tool

Security Affairs

Threat actors are spreading password-stealing malware disguised as a security tool to target Ukraine’s IT Army. Cisco Talos researchers have uncovered a malware campaign targeting Ukraine’s IT Army , threat actors are using infostealer malware mimicking a DDoS tool called the “Liberator.” ” continues the report.

DDOS 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Shortly after that, those same servers came under a sustained distributed denial-of-service (DDoS) attack. Chaput said whoever was behind the DDoS was definitely not using point-and-click DDoS tools, like a booter or stresser service. A DIRECT QUOT The domain quot[.]pw I waited until it expired and forgot to buy it.

Scams 243
article thumbnail

Widespread exploitation by botnet operators of Zyxel firewall flaw

Security Affairs

through 4.73, VPN series firmware versions 4.60 VPN ZLD V4.60 “Since the vulnerability is in the VPN service, which is enabled by default on the WAN, we expect the actual number of exposed and vulnerable devices to be much higher.” Mirai botnets are frequently used to conduct DDoS attacks.”

article thumbnail

Ukrainian police arrested Ransomware gang behind attacks on 50 companies

Security Affairs

The group was also carrying out DDoS attacks to paralyze the networks of the victims and force them to pay the ransom. The gang was also providing VPN-like services used by other cybercriminal organizations to carry out malicious activities used to deliver malware to the target organization. Source SSU.

article thumbnail

Security Affairs newsletter Round 313

Security Affairs

Experts found critical authentication bypass flaw in HPE Edgeline Infrastructure Manager UNC2529, a new sophisticated cybercrime gang that targets U.S.

article thumbnail

Ukrainian police dismantled a bot farm involved in multiple spam campaigns

Security Affairs

Cybercrime is a prolific business, criminal organizations continues to make profits with illegal activities in the cyberspace, but police are ready to contrast them. Crooks were preserving their anonymity using VPN and TOR services. SecurityAffairs – bot farm, cybercrime). “Cyber ?? Pierluigi Paganini.