Cybercriminals use Log4j in Trending, Profitable Cloud Attacks via “Proxyjacking”

vtqhtr413

Level 26
Thread author
Verified
Top Poster
Well-known
Aug 17, 2017
1,513
Threat actors have discovered a profitable new attack method that uses legal proxyware services, which let users resell some of their Internet bandwidth to outside parties. According to Sysdig Threat Research Team (TRT) researchers, cybercriminals can employ this “proxyjacking” attack vector in large-scale attacks that target cloud-based systems to potentially make hundreds of thousands of dollars per month in passive revenue. Researchers from Kaspersky defined proxyware services in the following way in a blog post from February: “[Users install a client that creates a] proxy server. Installed on a desktop computer or smartphone, it makes the device’s Internet connection accessible to an outside party.”
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top