July 25, 2023, 9:20 p.m. | BrianKrebs

Security Boulevard securityboulevard.com

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service called SocksEscort, which rents hacked residential and small business devices to cybercriminals looking to hide their true location online.


The post Who and What is Behind the Malware Proxy Service SocksEscort? appeared first on Security Boulevard.

access adrian crismaru advertisers a little sunshine attacks avrecon black lotus labs botnet business called devices domaintools.com engine findings hacked intel471 internet internet of things (iot) linux lumen malware old password proxy proxy service remote access remote access trojan researchers riley kilmer routers service socksescort spraying spur.us trojan web fraud 2.0 what is wiremo

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States