article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

911 says its network is made up entirely of users who voluntarily install its “free VPN” software. In this scenario, users indeed get to use a free VPN service, but they are often unaware that doing so will turn their computer into a proxy that lets others use their Internet address to transact online. “The 911[.]re

VPN 313
article thumbnail

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Krebs on Security

. “Separately, and unrelated to the outage, a routine audit of account activity identified potential unauthorized changes to a small number of customer domains and/or account information,” GoDaddy spokesperson Dan Race said. Restrict VPN access hours, where applicable, to mitigate access outside of allowed times.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

The SOCKS (or SOCKS5) protocol allows Internet users to channel their Web traffic through a proxy server, which then passes the information on to the intended destination. co and a VPN provider called HideIPVPN[.]com. The contact information on Crismaru’s LinkedIn page says his company websites include myiptest[.]com,

Malware 211
article thumbnail

Amid an Embarrassment of Riches, Ransom Gangs Increasingly Outsource Their Work

Krebs on Security

There’s an old adage in information security: “Every company gets penetration tested, whether or not they pay someone for the pleasure.” To wit: “There is huge insider information on the companies which we target, including information if there are tape drives and clouds (for example, Datto that is built to last, etc.),

article thumbnail

911 Proxy Service Implodes After Disclosing Breach

Krebs on Security

But some of them — like 911 — build their networks in part by offering “free VPN” or “free proxy” services that are powered by software which turns the user’s PC into a traffic relay for other users. “Not sure how did the hacker get in,” the 911 message reads.

article thumbnail

When Low-Tech Hacks Cause High-Impact Breaches

Krebs on Security

The general manager of Escrow.com said he suspected the call was a scam, but decided to play along for about an hour — all the while recording the call and coaxing information out of the scammer. “He was literally reading off the tickets to the notes of the admin panel inside GoDaddy.”

Hacking 278
article thumbnail

Experian, You Have Some Explaining to Do

Krebs on Security

Research suggests identity thieves were able to hijack the accounts simply by signing up for new accounts at Experian using the victim’s personal information and a different email address. “We believe these are isolated incidents of fraud using stolen consumer information,” Experian’s statement reads.