- Content source
- https://synthient.com/blog/proxybox-socks5systemz-lives-on
![]()
ProxyBox: Socks5Systemz Lives On
Synthient’s Research Team continuously tracks Black Hat proxy services due to the significant risks they pose to clients in the financial sector. Recently,...synthient.com
Executive Summary
Synthient’s Research Team continuously tracks Black Hat proxy services due to the significant risks they pose to clients in the financial sector. Recently, a service known as “ProxyBox” stood out after online discussions revealed its overwhelming popularity among threat actors for carding, credential stuffing, and identity theft. This report builds upon earlier research by the BitSights Research Team, detailing the evolution of this threat from its origins as "Socks5Systemz." Originally sold on underground hacking forums since 2013, the Socks5Systemz malware saw widespread commercial use under the banner of PROXY[.]AM. Following that platform's shutdown, the service rebranded as ProxyBox and continued to provide clients with access to 32,000 to 35,0000 daily active IPs (DAI).
To build this massive network of residential IPs, ProxyBox acquires initial access by tricking users into downloading infected files from cracked software sites. Synthient has observed a growing trend of proxy providers exploiting these consumer-focused piracy vectors to rapidly expand their infrastructure.
Because this consumer-driven threat poses a unique risk to enterprise environments, organizations must adopt proactive countermeasures. On a human level, users should be strictly warned against downloading unverified, third-party software. On a technical level, organizations should block the malware's tier 1 and tier 2 relay servers, cutting off proxying and rendering the infection ineffective. Furthermore, enforcing strict network policies to block commonly abused proxy protocols is highly recommended to mitigate this ongoing risk.
Last edited by a moderator: