{"id":10150,"date":"2013-03-20T00:00:43","date_gmt":"2013-03-20T07:00:43","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=10150"},"modified":"2018-01-30T12:23:52","modified_gmt":"2018-01-30T19:23:52","slug":"hacked-pcs-as-anonymization-stepping-stones-service-operates-in-the-open-since-2004","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/03\/20\/hacked-pcs-as-anonymization-stepping-stones-service-operates-in-the-open-since-2004\/","title":{"rendered":"Hacked PCs as &#8216;anonymization stepping-stones&#8217; service operates in the open since 2004"},"content":{"rendered":"<p><strong>By Dancho\u00a0Danchev<\/strong><\/p>\n<p>On the majority of\u00a0occasions, cybercriminals will take basic <a href=\"http:\/\/en.wikipedia.org\/wiki\/Operations_security\"><strong>OPSEC (Operational Security)<\/strong><\/a> precautions when using the Internet, in an attempt to <a href=\"http:\/\/ddanchev.blogspot.com\/2008\/10\/cost-of-anonymizing-cybercriminals.html\"><strong>make it harder for law enforcement<\/strong><\/a> to keep track of their fraudulent activities. Over the years, these techniques have greatly evolved to include <a href=\"http:\/\/ddanchev.blogspot.com\/2009\/02\/cost-of-anonymizing-cybercriminals.html\"><strong>hybrid online anonymity solutions<\/strong><\/a>\u00a0offered exclusively to cybercriminals internationally.<\/p>\n<p>In this post, I&#8217;ll profile a cybercrime-friendly\u00a0service that&#8217;s been offering hacked PCs to be converted into &#8220;anonymization stepping-stones&#8221; since 2004.<\/p>\n<p>More details:<!--more--><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-10160\" alt=\"Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime.png\" width=\"241\" height=\"179\" \/><\/a><\/p>\n<p>The service offers a self-serving DIY Web interface, allowing <a href=\"http:\/\/blog.webroot.com\/2012\/03\/02\/new-service-converts-malware-infected-hosts-into-anonymization-proxies\/\"><strong>potential cybercriminals looking for ways to hide their online activities<\/strong><\/a>, to\u00a0not only gain access to malware-infected hosts internationally, but to\u00a0&#8220;chain&#8221; multiple hosts in an attempt to make it even harder to law enforcement to track them down. According to its description, 4000 new &#8220;Socks4\/5 proxy servers&#8221; are added to the service on a daily basis. And in order to make it even easier for cybercriminals to use the service, it features a custom coded Proxy Management Software\u00a0which greatly assists cybercriminals interacting with the service.<\/p>\n<p><strong>Sample screenshot of the DIY Web interface:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_02.gif\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-10161\" alt=\"Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_02.gif\" width=\"279\" height=\"180\" \/><\/a><\/p>\n<p><strong>Sample screenshot of the service-branded Proxy Management Software:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_011.gif\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-10163\" alt=\"Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_011.gif\" width=\"202\" height=\"218\" \/><\/a><\/p>\n<p>The service allows cybercriminals to easily &#8220;autochange&#8221; the proxies in use, and automatically rotate them in an attempt to make their activities nearly impossible to trace.<\/p>\n<p><strong>Sample screenshot of a connected Socks 4\/5 proxy in action:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_03.gif\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-10164\" alt=\"Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_03\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_03.gif\" width=\"162\" height=\"147\" \/><\/a><\/p>\n<p><strong>Sample statistics of malware-infected hosts internationally, to be used as &#8220;anonymization\u00a0stepping-stones&#8221;:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_04.gif\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-10165\" alt=\"Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_04\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_04.gif\" width=\"172\" height=\"161\" \/><\/a><\/p>\n<p><strong>Sample geolocated\u00a0malware-infected hosts, courtesy of the cybercrime-friendly service:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_05.gif\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-10166\" alt=\"Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_05\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/malware_infected_host_stepping_stone_socks_server_anonymity_cybercrime_05.gif\" width=\"203\" height=\"164\" \/><\/a><\/p>\n<p><strong>The prices are as follows:<\/strong><\/p>\n<ul>\n<li>150 proxies per month &#8211; $25<\/li>\n<li>300 proxies per month &#8211; $40<\/li>\n<li>600 proxies per month &#8211; $50<\/li>\n<li>900 proxies per month &#8211; $65<\/li>\n<li>1500 proxies per month &#8211; $95<\/li>\n<\/ul>\n<p>We&#8217;ll continue monitoring the development of this service, and post updates as soon as new developments emerge.<\/p>\n<p><em>You can find more about Dancho\u00a0Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Dancho\u00a0Danchev On the majority of\u00a0occasions, cybercriminals will take basic OPSEC (Operational Security) precautions when using the Internet, in an attempt to make it harder for law enforcement to keep track of their fraudulent activities. Over the years, these techniques have greatly evolved to include hybrid online anonymity solutions\u00a0offered exclusively to cybercriminals internationally. In this [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,13797,13795,5411,5735,13799,13789,13803,6105,9887,13791,13807,11585,13805,13793,3875,5605,3947,3471,13801],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10150"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=10150"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10150\/revisions"}],"predecessor-version":[{"id":23714,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10150\/revisions\/23714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=10150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=10150"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=10150"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=10150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}