Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Mozilla announces an AI ‘window’ for Firefox

    Mozilla announces an AI ‘window’ for Firefox

    November 13, 2025
    Who is buying VR and XR headsets anyway?

    Who is buying VR and XR headsets anyway?

    November 13, 2025
    Starlink rival ‘Project Kuiper’ rebrands to Amazon Leo

    Starlink rival ‘Project Kuiper’ rebrands to Amazon Leo

    November 13, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
    Security

    Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

    News RoomBy News RoomJune 9, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

    For years, gray-market services known as “bulletproof” hosts have been a key tool for cybercriminals looking to anonymously maintain web infrastructure with no questions asked. But as global law enforcement scrambles to crack down on digital threats, they have developed strategies for getting customer information from these hosts and have increasingly targeted the people behind the services with indictments. At the cybercrime-focused conference Sleuthcon in in Arlington, Virginia, today, researcher Thibault Seret outlined how this shift has pushed both bulletproof hosting companies and criminal customers toward an alternative approach.

    Rather than relying on web hosts to find ways of operating outside law enforcement’s reach, some service providers have turned to offering purpose-built VPNs and other proxy services as a way of rotating and masking customer IP addresses and offering infrastructure that either intentionally doesn’t log traffic or mixes traffic from many sources together. And while the technology isn’t new, Seret and other researchers emphasized to WIRED that the transition to using proxies among cybercrminals over the last couple of years is significant.

    “The issue is, you cannot technically distinguish which traffic in a node is bad and which traffic is good,” Seret, a researcher at the threat intelligence firm Team Cymru, told WIRED ahead of his talk. “That’s the magic of a proxy service—you cannot tell who’s who. It’s good in terms of internet freedom, but it’s super, super tough to analyze what’s happening and identify bad activity.”

    The core challenge of addressing cybercriminal activity hidden by proxies is that the services may also, even primarily, be facilitating legitimate, benign traffic. Criminals and companies that don’t want to lose them as clients have particularly been leaning on what are known as “residential proxies,” an array of decentralized nodes that can run on consumer devices—even old Android phones or low-end laptops—offering real, rotating IP addresses assigned to homes and offices. Such services offer anonymity and privacy, but can also shield malicious traffic.

    By making malicious traffic look like it comes from trusted consumer IP addresses, attackers make it much more difficult for organizations’ scanners and other threat detection tools to spot suspicious activity. And, crucially, residential proxies and other decentralized platforms that run on disparate consumer hardware reduce a service provider’s insight and control, making it more difficult for law enforcement to get anything useful from them.

    “Attackers have been ramping up their use of residential networks for attacks over the last two to three years,” says Ronnie Tokazowski, a longtime digital scams researcher and cofounder of the nonprofit Intelligence for Good. “If attackers are coming from the same residential ranges as, say, employees of a target organization, it’s harder to track.”

    Criminal use of proxies isn’t new. In 2016, for example, the US Department of Justice said that one of the obstacles in a years-long investigation of the notorious “Avalanche” cybercriminal platform was the service’s use of a “fast-flux” hosting method that concealed the platform’s malicious activity using constantly changing proxy IP addresses. But the rise of proxies as a gray-market service rather than something attackers must develop in-house is an important shift.

    “I don’t know yet how we can improve the proxy issue,” Team Cymru’s Seret told WIRED. “I guess law enforcement could target known malicious proxy providers like they did with bulletproof hosts. But in general, proxies are whole internet services used by everyone. Even if you take down one malicious service, that doesn’t solve the larger challenge.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleApple’s big updates for Intel-based Macs will end with Tahoe
    Next Article You can now try Microsoft’s new Start menu for Windows 11

    Related Posts

    Zohran Mamdani Just Inherited the NYPD Surveillance State

    Zohran Mamdani Just Inherited the NYPD Surveillance State

    November 12, 2025
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    November 7, 2025
    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    November 7, 2025
    ICE Wants to Build a Shadow Deportation Network in Texas

    ICE Wants to Build a Shadow Deportation Network in Texas

    November 6, 2025
    Hack Exposes Kansas City’s Secret Police Misconduct List

    Hack Exposes Kansas City’s Secret Police Misconduct List

    November 5, 2025
    Our Picks
    Who is buying VR and XR headsets anyway?

    Who is buying VR and XR headsets anyway?

    November 13, 2025
    Starlink rival ‘Project Kuiper’ rebrands to Amazon Leo

    Starlink rival ‘Project Kuiper’ rebrands to Amazon Leo

    November 13, 2025
    Apple TV is getting MLS games at no extra cost

    Apple TV is getting MLS games at no extra cost

    November 13, 2025
    Hackers use Anthropic’s AI model Claude once again

    Hackers use Anthropic’s AI model Claude once again

    November 13, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Valve wants Half-Life: Alyx to work well standalone on Steam Frame News

    Valve wants Half-Life: Alyx to work well standalone on Steam Frame

    By News RoomNovember 13, 2025

    When I tried Half-Life: Alyx streaming from a PC to Valve’s new Steam Frame VR…

    Apple will take a mini commission from mini app developers

    Apple will take a mini commission from mini app developers

    November 13, 2025
    The last-gen Apple Watch Series 10 has returned to its lowest price to date

    The last-gen Apple Watch Series 10 has returned to its lowest price to date

    November 13, 2025
    The Fire TV Stick 4K Max is back down to , its best price in a year

    The Fire TV Stick 4K Max is back down to $35, its best price in a year

    November 13, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.