Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Malware Turns Infected Systems Into Proxies

Security researchers at Palo Alto Networks have discovered a new family of malware that secretly turns infected systems into Internet proxies.

Security researchers at Palo Alto Networks have discovered a new family of malware that secretly turns infected systems into Internet proxies.

Dubbed ProxyBack, the family includes over 20 malware versions and has been observed infecting systems since March 2014, Palo Alto Networks’ Jeff White explains in a blog post. According to the researchers, ProxyBack’s distribution in focused mainly in Europe, and its primary targets appear to be educational institutions.

Proxies are often used to protect one’s privacy on the Internet, but the malware creates a dangerous situation for users by turning their systems into proxies and abusing them as a proxy service. Moreover, the masterminds behind it managed to configure compromised machines in a manner that allows network traffic to flow through the proxies unhindered.

To ensure that the proxy is not blocked by firewalls or other network based restrictions, ProxyBack builds a reverse tunnel over TCP to an attacker controlled proxy server. Through having the infected system make the initial call home, the proxy server can send its traffic through the tunnel and to the Internet or to other devices on the network unrestricted.

This approach means that the victim proxy creates a hole in the firewall by establishing a TCP connection with the attacker controlled proxy server, while the server validates its access to the victim proxy and the ability to successfully route traffic through it. As soon as that happens, the victim proxy is unwillingly participating in the routing of web traffic to the Internet, the network security firm said.

The first step ProxyBack takes when establishing the tunnel is to make a connection to a web server hosting a PHP file that contains a URL to another PHP file on the same server. The second PHP file is used to send commands to the initial web server and grab information to set up the proxy connection.

The server is provided with information that includes the public IP address of the victim proxy and the ID for the victim proxy. The ID is used to keep track of the infected system, and Palo Alto Networks determined that over 11,000 machines could have been compromised to date.

ProxyBack also reports the version of the running malware and the running operating system, and the security researchers suggest that it might be running on Windows 2000 and older platform iterations, including Windows Home Server and Windows Server 2003 to Windows Server 2016, since it can report any of these versions to the proxy server.

Advertisement. Scroll to continue reading.

Palo Alto Networks reports a sizable increase in traffic routed through infected systems and notes that ProxyBack is used as a proxy service, but that users’ traffic is neither anonymous nor safe from tampering. Most of the traffic is said to source from an automated system creating fake accounts across dating sites like “farmersonly.com”, “match.com”, “meetme.com”, and “okcupid.com”.

Another website was “buyproxy.ru,” which matched a proxy service found within the security firm’s captures, with a GET Request Method to http://buyproxy[.]ru/proxy/ observed at less than 4 hours into the capture. However, there was also legitimate traffic coming from benign users, and it included sites like eBay, Twitter, Craigslist, Facebook, Wikipedia, and more.

The buyproxy[.]ru website claims to have been in business for over 7 years and to offer private proxy servers that are not in public proxy bases, while also saying that connections are encrypted and use a “proprietary technology of traffic tunneling.” Security researchers found various victim proxies listed on the website, suggesting that, if people behind “buyproxy[.]ru” are not responsible for the distribution of the ProxyBack malware, the malware is certainly designed for and used in their service.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.