July 25, 2023, 9:20 p.m. | BrianKrebs

Krebs on Security krebsonsecurity.com

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service called SocksEscort, which rents hacked residential and small business devices to cybercriminals looking to hide their true location online.

access adrian crismaru advertisers a little sunshine attacks avrecon black lotus labs botnet business called devices domaintools.com engine findings hacked intel471 internet internet of things (iot) linux lumen malware old password proxy proxy service remote access remote access trojan researchers riley kilmer routers service socksescort spraying spur.us trojan web fraud 2.0 what is wiremo

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Threat Analysis Engineer

@ Gen | IND - Tamil Nadu, Chennai

Head of Security

@ Hippocratic AI | Palo Alto

IT Security Vulnerability Management Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Security Engineer - Netskope/Proofpoint

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Journeyman Cybersecurity Analyst

@ ISYS Technologies | Kirtland AFB, NM, United States