article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

911 says its network is made up entirely of users who voluntarily install its “free VPN” software. Residential proxy services are often marketed to people seeking the ability to evade country-specific blocking by the major movie and media streaming providers. “The free VPN apps, and the other is trojanized torrents.

VPN 313
article thumbnail

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Krebs on Security

The phishers often will explain that they’re calling from the employer’s IT department to help troubleshoot issues with the company’s email or virtual private networking (VPN) technology. Restrict VPN access hours, where applicable, to mitigate access outside of allowed times.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

911 Proxy Service Implodes After Disclosing Breach

Krebs on Security

Residential proxy services are often marketed to people seeking the ability to evade country-specific blocking by the major movie and media streaming providers.

article thumbnail

Giving a Face to the Malware Proxy Service ‘Faceless’

Krebs on Security

Riley Kilmer is co-founder of Spur.us , a company that tracks thousands of VPN and proxy networks, and helps customers identify traffic coming through these anonymity services. as a media sharing device on a local network that was somehow exposed to the Internet. Image: spur.us. and asus@mail.ru.

Malware 243
article thumbnail

When Low-Tech Hacks Cause High-Impact Breaches

Krebs on Security

Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and foist malware on customer websites.

Hacking 278
article thumbnail

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

Krebs on Security

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. This is very illegal and you will get raided if you don’t use a vpn. I am not legally responsible if you mishandle this.