Australia markets close in 3 hours 59 minutes
  • ALL ORDS

    6,806.20
    -11.90 (-0.17%)
     
  • ASX 200

    6,613.10
    -16.20 (-0.24%)
     
  • AUD/USD

    0.6817
    +0.0018 (+0.26%)
     
  • OIL

    100.19
    +0.69 (+0.69%)
     
  • GOLD

    1,768.70
    +4.80 (+0.27%)
     
  • BTC-AUD

    29,172.01
    -710.17 (-2.38%)
     
  • CMC Crypto 200

    429.84
    -10.19 (-2.32%)
     
  • AUD/EUR

    0.6637
    +0.0021 (+0.31%)
     
  • AUD/NZD

    1.1031
    +0.0017 (+0.16%)
     
  • NZX 50

    11,050.24
    +85.07 (+0.78%)
     
  • NASDAQ

    11,779.90
    +194.23 (+1.68%)
     
  • FTSE

    7,025.47
    -207.18 (-2.86%)
     
  • Dow Jones

    30,967.82
    -129.44 (-0.42%)
     
  • DAX

    12,401.20
    -372.18 (-2.91%)
     
  • Hang Seng

    21,722.28
    -130.79 (-0.60%)
     
  • NIKKEI 225

    26,112.16
    -311.31 (-1.18%)
     

Rsocks, a popular proxy service, was just seized by the DOJ

·2-min read

The U.S. Department of Justice has confirmed it has seized and dismantled the infrastructure of a Russian botnet used to hijack millions of devices worldwide for use as proxy servers.

According to prosecutors, Rsocks provided its web proxy service — operated by unnamed Russian cybercriminals — by hacking into millions of computers, smartphones and Internet of Things devices, and converting them into unwitting proxy servers, allowing paying customers to use the IP addresses of the compromised devices without the permission or the knowledge of the owners.

Rsocks' own Twitter account claimed access to more than eight million residential devices and more than one million mobile IPs.

Proxy services, which are not inherently illicit or illegal, provide IP addresses to its clients for a fee, such as bypassing censorship or accessing content geo-blocked to a particular region. But according to prosecutors, Rsocks was allegedly hacking into millions of devices by conducting brute force attacks.

Customers could access a web-based “storefront” where they could rent access to proxies for a specific time period. Once purchased, the customer could download a list of IP addresses and ports associated with one or more of the botnet’s backend servers, and then route malicious internet traffic through the compromised devices to mask or hide the true source of the traffic.

“It is believed that the users of this type of proxy service were conducting large scale attacks against authentication services, also known as credential stuffing, and anonymizing themselves when accessing compromised social media accounts, or sending malicious email, such as phishing messages,” the Justice Department said in a press release announcing the successful takedown of the botnet’s infrastructure.

FBI investigators used undercover purchases to get access to the Rsocks botnet to identify its backend infrastructure and victims. The initial undercover purchase in early 2017 identified approximately 325,000 compromised victim devices, mainly located in the United States.

As well as home businesses and individuals, several large public and private entities have fallen victim to the Rsocks botnet, prosecutors said, including a university, a hotel, a television studio and an electronics manufacturer — and homes and small businesses.

“Cyber criminals will not escape justice regardless of where they operate,” said U.S. Attorney Randy Grossman.” Working with public and private partners around the globe, we will relentlessly pursue them while using all the tools at our disposal to disrupt their threats and prosecute those responsible.”

The Rsocks botnet is the second of its kind that has recently been dismantled by U.S. authorities. In April, an FBI operation revealed that it had disrupted another botnet, known as Cyclops Blink, which was operated by a group of hackers working for Russia’s GRU, the country’s military intelligence unit.

Our goal is to create a safe and engaging place for users to connect over interests and passions. In order to improve our community experience, we are temporarily suspending article commenting