Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security

8/2/2019
12:08 PM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Bulletproof Proxy Providers Try to Hide Botnet IP Address Needles in Haystacks

Cequence Security's CQ Prime research team thinks it has spotted a new trend it calls 'bulletproof proxies.'

Cequence Security's CQ Prime research team thinks it has spotted a new trend it calls "bulletproof proxies." It's related to bulletproof hosting where providers offer considerable leniency in what content may be uploaded and distributed through their infrastructure and as well as protection from law enforcement investigations, information requests, subpoenas and the like. Take the same idea and apply it to a proxy hoster.

Bulletproof proxy providers will include millions of globally distributed residential IP addresses in their namespace that are marketed under the false pretenses of being used for legitimate purposes and aggressively compete against one another for their share of adversarial buyers, according to Cequence.

It also says in the report that attacks emanating from bulletproof proxy networks targeting Cequence financial services and retail customer environments increased 518% and 800% respectively between Q1-Q2 2019. They also say that more than 70% of the attack traffic across bulletproof proxy networks targeted mobile endpoints.

The inaugural analysis of automated malicious bot campaigns that Cequence performed was conducted across three industry verticals, where bulletproof proxies were found to be used as a means of distributing attacks globally across millions of high-reputation, residential IP addresses (such as routers, refrigerators, IoT devices, garage door motors and others).

Will Glazier, head of CQ Prime research, said that "The initial focus of CQ Prime will be research on the growing number of malicious, automated bot attacks and the four key components of each unique attack: user credentials, infrastructure, tools and behaviors. These attacks, which are nearly impossible to detect with legacy security tools, abuse business application logic, enabling bad actors to achieve various fraud and theft objectives."

These sort of proxy providers will support IPs that appear as coming from residential providers such as Comcast, AT&T, Bell and Vodafone. This organization of IP infrastructure will mess up defenders from being able to throw out defending responses aimed at particular IP blocks, networks or even individual IPs themselves. The same IP could be used for both legitimate and attacking transactions.

But in early May, they observed a large influx of attack traffic coming from Cogent Communications and Isomedia. The attack pattern spread across multiple customers. Further investigation revealed the traffic was being generated by the Bulletproof Proxy Provider SmartProxy. All told, they saw a 548% increase in traffic from these seemingly legitimate ISPs in a little less than a three-month period.

But to what end? Well, they went on to find use cases of social media automation, sneaker bots, ticket bots (both of which buy up merchandise to sell on the secondary market) and black hat SEO Optimization (to cause click fraud or undeserved ranking in search engines) tended to dominate the marketing material of these bulletproof proxy services.

Some metrics that might be used to detect abnormal bot activity that is using proxies may include changes in behavior and traffic distributions that deviate substantially from the norm. That may be expressed as login failure ratios, irregular fast POST patterns in a user session of a scraper, or irregular rotation and obfuscation among fields.

Bots are trying to camouflage themselves to make it harder to eradicate them. Spreading IP addresses globally is just one of the tricks that botmasters are employing, but one worthy of attention in a security posture.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.