{"id":15172,"date":"2013-12-03T09:28:44","date_gmt":"2013-12-03T16:28:44","guid":{"rendered":"https://www.webroot.com/blog/?p=15172"},"modified":"2023-11-01T14:11:38","modified_gmt":"2023-11-01T20:11:38","slug":"cybercrime-friendly-vpn-service-provider-pitches-recommended-edward-snowden","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/12\/03\/cybercrime-friendly-vpn-service-provider-pitches-recommended-edward-snowden\/","title":{"rendered":"Cybercrime-friendly VPN service provider pitches itself as being &#8216;recommended by Edward Snowden&#8217;"},"content":{"rendered":"<p>We&#8217;ve recently spotted a multi-hop Russian cybercrime-friendly VPN service provider &#8212; ad featured not syndicated at a well known cybercrime-friendly community &#8212;\u00a0that is relying on fake celebrity endorsement on its way to attract new customers, in this particular case, it&#8217;s pitching itself as being recommended by ex-NSA contractor Edward Snowden. How have anonymization tactics evolved over the last couple of years? Have the bad guys been &#8216;innovating&#8217; on their way to cover the malicious\/fraudulent online activity orchestrated by them? Let&#8217;d discuss some of the current trends in this ever-green market segment within the cybercrime ecosystem.<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample ad featured at the cybercrime-friendly community:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/11\/Cybercrime_VPN_Edward_Snowden_Recommended_Featured.png\"><img decoding=\"async\" loading=\"lazy\" width=\"486\" height=\"61\" class=\"size-full wp-image-15181 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/11\/Cybercrime_VPN_Edward_Snowden_Recommended_Featured.png\" alt=\"Cybercrime_VPN_Edward_Snowden_Recommended_Featured\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/11\/Cybercrime_VPN_Edward_Snowden_Recommended_Featured.png 486w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/11\/Cybercrime_VPN_Edward_Snowden_Recommended_Featured-300x37.png 300w\" sizes=\"(max-width: 486px) 100vw, 486px\" \/><\/a><\/p>\n<p>It didn&#8217;t take long for cybercriminals to realize the massive potential for abusing already created botnets, in terms of utilizing them as <a href=\"http:\/\/ddanchev.blogspot.com\/2008\/10\/cost-of-anonymizing-cybercriminals.html\"><strong>anonymization-based type of infrastructure<\/strong><\/a>. Empowering them with the necessary foundations for launching attacks relying on the <a href=\"http:\/\/ddanchev.blogspot.com\/2008\/02\/malware-infected-hosts-as-stepping.html\"><strong>&#8216;stepping-stones&#8217; concept<\/strong><\/a>, completely mixing the malicious\/legitimate\u00a0<a href=\"http:\/\/ddanchev.blogspot.com\/2009\/02\/cost-of-anonymizing-cybercriminals.html\"><strong>logs-free anonymization infrastructure<\/strong><\/a>, or setting up multi-hop cybercrime-friendly VPN service providers, these practices added <a href=\"http:\/\/ddanchev.blogspot.com\/2013\/08\/the-cost-of-anonymizing-cybercriminals_23.html\"><strong>additional layers of anonymity<\/strong><\/a> to their Internet activities, primarily relying on\u00a0<a href=\"http:\/\/ddanchev.blogspot.com\/2013\/08\/the-cost-of-anonymizing-cybercriminals.html\"><strong>basic &#8216;risk-forwarding&#8217; tactics<\/strong><\/a>. Next to the utilization of these concepts, the massive\/de-facto\u00a0<strong>adoption of Socks4\/Socks5 modular features<\/strong>, found in a huge percentage of modern malware\/crimeware\/<a href=\"https://www.webroot.com/blog/2013\/06\/03\/compromised-ftpssh-account-privilege-escalating-mass-iframe-embedding-platform-released-on-the-underground-marketplace\/\"><strong>platform<\/strong><\/a> releases, helped opportunistic cybercriminals to quickly monetize the market segment, by empowering others with the same capabilities through their &#8220;<a href=\"https://www.webroot.com/blog/2013\/03\/20\/hacked-pcs-as-anonymization-stepping-stones-service-operates-in-the-open-since-2004\/\"><strong>cybercrime-as-a-service<\/strong><\/a>&#8221; type of underground market propositions.<\/p>\n<p>Throughout 2013, we continued to observe a decent supply of &#8220;<strong>hacked-PCs-as-a-service<\/strong>&#8220;, with some of the market-leading\/well known\/reputable vendors, still in operation. Moreover, thanks to the general availability of Socks4\/Socks5 converted anonymization hosts, we also continue to observe a decent supply of CAPTCHA-based proxy-supporting DIY automatic account registration\/<a href=\"https://www.webroot.com/blog/2013\/11\/21\/newly-released-proxy-supporting-origin-brute-forcing-tools-targets-users-weak-passwords\/\"><strong>brute-forcing<\/strong><\/a> tools, <a href=\"https://www.webroot.com/blog/2013\/09\/20\/cybercriminals-release-new-socks4socks5-malware-infected-hosts-based-diy-dos-tool\/\"><strong>Denial of Service (Dos) attack tools<\/strong><\/a> relying on hacked\/compromised PCs, as well as the now de-factor standard for the cybercrime ecosystem, use of APIs for the purpose of supplying fellow cybercriminals with access to fresh IPs with clean IP reputation.<\/p>\n<p>We expect to continue observing a mix between a purely malicious infrastructure, in combination with legitimate logs-free infrastructure, for the purpose of anonymizing a cybercriminals online activities, successfully bypassing current data retention regulations in place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve recently spotted a multi-hop Russian cybercrime-friendly VPN service provider &#8212; ad featured not syndicated at a well known cybercrime-friendly community &#8212;\u00a0that is relying on fake celebrity endorsement on its way to attract new customers, in this particular case, it&#8217;s pitching itself as being recommended by ex-NSA contractor Edward Snowden. How have anonymization tactics evolved [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4051,16797,16803,6103,10777,16799,16795,16787,5411,16801,5019,5799,6045,16793,16785,13165,3947,5351,16791],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15172"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15172"}],"version-history":[{"count":13,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15172\/revisions"}],"predecessor-version":[{"id":32193,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15172\/revisions\/32193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15172"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15172"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}