Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Realme 15 5G, Realme 15 Pro 5G Confirmed to Launch in India Soon

30 June 2025

iPhone 17 Pro’s New Camera Design May Force Apple to Move Its Iconic Logo: Report

30 June 2025

Samsung Galaxy Z Fold 7, Galaxy Z Flip 7 Leak Suggests Key Specifications

30 June 2025
Facebook X (Twitter) Instagram
Just In
  • Realme 15 5G, Realme 15 Pro 5G Confirmed to Launch in India Soon
  • iPhone 17 Pro’s New Camera Design May Force Apple to Move Its Iconic Logo: Report
  • Samsung Galaxy Z Fold 7, Galaxy Z Flip 7 Leak Suggests Key Specifications
  • iQOO 13 to Be Available in a New Green Colour Option in India on July 4
  • AI+ Nova 5G, Pulse Smartphones to Launch in India on July 8; Price Range, Specifications Teased
  • Best Gaming Phones Under Rs 30,000: Infinix GT 30 Pro 5G, iQOO Neo 10R, Poco X7 Pro, More
  • OpenAI Leadership Responds to Meta Offers: ‘Someone Has Broken Into Our Home’
  • I Let AI Agents Plan My Vacation—and It Wasn’t Terrible
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
News

Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

News RoomBy News Room6 June 20253 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

For years, gray market services known as “bulletproof” hosts have been a key tool for cybercriminals looking to anonymously maintain web infrastructure with no questions asked. But as global law enforcement scrambles to crack down on digital threats, they have developed strategies for getting customer information from these hosts and have increasingly targeted the people behind the services with indictments. At the cybercrime-focused conference Sleuthcon in in Arlington, Virginia today, researcher Thibault Seret outlined how this shift has pushed both bulletproof hosting companies and criminal customers toward an alternative approach.

Rather than relying on web hosts to find ways of operating outside law enforcement’s reach, some service providers have turned to offering purpose-built VPNs and other proxy services as a way of rotating and masking customer IP addresses and offering infrastructure that either intentionally doesn’t log traffic or mixes traffic from many sources together. And while the technology isn’t new, Seret and other researchers emphasized to WIRED that the transition to using proxies among cybercrminals over the last couple of years is significant.

“The issue is, you cannot technically distinguish which traffic in a node is bad and which traffic is good,” Seret, a researcher at the threat intelligence firm Team Cymru, told WIRED ahead of his talk. “That’s the magic of a proxy service—you cannot tell who’s who. It’s good in terms of internet freedom, but it’s super, super tough to analyze what’s happening and identify bad activity.”

The core challenge of addressing cybercriminal activity hidden by proxies is that the services may also, even primarily, be facilitating legitimate, benign traffic. Criminals and companies that don’t want to lose them as clients have particularly been leaning on what are known as “residential proxies,” or an array of decentralized nodes that can run on consumer devices—even old Android phones or low end laptops—offering real, rotating IP addresses assigned to homes and offices. Such services offer anonymity and privacy, but can also shield malicious traffic.

By making malicious traffic look like it comes from trusted consumer IP addresses, attackers make it much more difficult for organizations’ scanners and other threat detection tools to spot suspicious activity. And, crucially, residential proxies and other decentralized platforms that run on disparate consumer hardware reduce a service provider’s insight and control, making it more difficult for law enforcement to get anything useful from them.

“Attackers have been ramping up their use of residential networks for attacks over the last two to three years,” says Ronnie Tokazowski, a longtime digital scams researcher and cofounder of the nonprofit Intelligence for Good. “If attackers are coming from the same residential ranges as, say, employees of a target organization, it’s harder to track.”

Criminal use of proxies isn’t new. In 2016, for example, the US Department of Justice said that one of the obstacles in a years-long investigation of the notorious “Avalanche” cybercriminal platform was the service’s use of a “fast-flux” hosting method that concealed the platform’s malicious activity using constantly changing proxy IP addresses. But the rise of proxies as a gray market service rather than something attackers must develop in-house is an important shift.

“I don’t know yet how we can improve the proxy issue,” Team Cymru’s Seret told WIRED. “I guess law enforcement could target known malicious proxy providers like they did with bulletproof hosts. But in general, proxies are whole internet services used by everyone. Even if you take down one malicious service, that doesn’t solve the larger challenge.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHuawei Mate XT 2 Tipped to Launch in H2 2025 With Upgraded Chipset, Cameras
Next Article The Game Maker’s Sketchbook Event Sells Prints Of Impressive Video Game Art In The Name Of Charity

Related Articles

News

OpenAI Leadership Responds to Meta Offers: ‘Someone Has Broken Into Our Home’

29 June 2025
News

I Let AI Agents Plan My Vacation—and It Wasn’t Terrible

29 June 2025
News

The Best Dash Kitchen Appliances for Small Apartments and Budgets

29 June 2025
News

Fairphone Has a New Plan to Get You to Care

29 June 2025
News

Student Solves a Long-Standing Problem About the Limits of Addition

29 June 2025
News

The Best Printers for Home and Office

29 June 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202499 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202581 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Phones

Best Gaming Phones Under Rs 30,000: Infinix GT 30 Pro 5G, iQOO Neo 10R, Poco X7 Pro, More

News Room30 June 2025
News

OpenAI Leadership Responds to Meta Offers: ‘Someone Has Broken Into Our Home’

News Room29 June 2025
News

I Let AI Agents Plan My Vacation—and It Wasn’t Terrible

News Room29 June 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202499 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

iQOO 13 to Be Available in a New Green Colour Option in India on July 4

30 June 2025

AI+ Nova 5G, Pulse Smartphones to Launch in India on July 8; Price Range, Specifications Teased

30 June 2025

Best Gaming Phones Under Rs 30,000: Infinix GT 30 Pro 5G, iQOO Neo 10R, Poco X7 Pro, More

30 June 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.