How Socks5Systemz Botnet Powers Proxy.AM with 85,000+ Devices

13 views 2 minutes read

Have you ever wondered how cybercriminals exploit hacked devices to fuel their operations? Socks5Systemz botnet powers Proxy.AM, a controversial proxy service, which is using over 85,000 compromised systems worldwide.

This sophisticated botnet has silently operated under the radar for years, providing anonymity for illegal activities. Investigation reveals how this malware evolved, the scale of its impact, and the implications for cybersecurity.

Key Takeaway

  • How Socks5Systemz Botnet Powers Proxy.AM: A cyber threat leveraging over 85,000 hacked devices to run an illicit proxy network.

Unveiling Socks5Systemz: The Origins

The Socks5Systemz botnet first surfaced on underground forums in 2013 but gained traction only in recent years. This malware converts hacked devices into proxy exit nodes, allowing threat actors to mask their online activity.

Initially part of larger malware campaigns like Andromeda and Smokeloader, Socks5Systemz operated unnoticed by many researchers until late 2023.

Timeline of Socks5Systemz Development:

YearMilestone
2013First mentioned in Russian cybercrime forums
2017Integrated as a SOCKS5 proxy module for Andromeda and Trickbot
2023Standalone version gains widespread attention
2024Estimated 85,000-100,000 active bots globally

How Socks5Systemz Botnet Powers Proxy.AM

The botnet enables Proxy.AM to offer “elite, private, and anonymous” proxy services to its customers. According to Bitsight TRACE’s research, Proxy.AM boasts over 300,000 proxies and earns revenue through subscription packages ranging from $90 to $700 per month.

This massive network thrives by compromising devices in countries such as India, Indonesia, and Ukraine.

Here’s a breakdown of the most affected regions:

CountryInfections
India40,153
Indonesia17,027
Ukraine11,178
Algeria8,255
Vietnam8047
Russian Federation7826
Turkey7288
Brazil7224
Mexico6987
Pakistan6802
Thailand6452
Philippines5664
Colombia5165
Egypt5164
United States4,784
Argentina4756
Bangladesh4432
Morocco3758
Nigeria3625
Others73573

The top 10 most affected countries are, in order, India, Brazil, Colombia, South Africa, Bangladesh, Argentina, Angola, United States, Suriname, and Nigeria.

Graphical representation of Socks5Systemz botnet infections
Graphical representation of Socks5Systemz infections

Why Has Socks5Systemz Remained Under the Radar?

Experts believe its stealth is due to its integration within other malware families. By operating as a proxy module for Andromeda and Smokeloader, Socks5Systemz avoided direct detection.

Its resurgence as a standalone malware in 2023 signals a shift in the cybercrime ecosystem.

Geographic distribution of victims of Socks5Systemz Botnet infections
Geographic distribution of victims of Socks5Systemz Botnet infections, SOURCE: bitsight.com

Malware Evolution and Infrastructure Updates

Recent changes in Socks5Systemz include:

  • Expanded Infrastructure: 26 servers spread across Europe.
  • Advanced Malware Obfuscation: Harder to detect and analyze.
  • Improved Protocols: Updates in communication and encryption methods.

Despite these upgrades, its core functionality remains the same: turning hacked devices into proxy nodes.

Proxy.AM’s Role in Cybercrime

Proxy.AM markets itself as a legitimate service, but its reliance on the Socks5Systemz botnet reveals its dark underpinnings.

By exploiting a vast network of infected devices, the service aids cybercriminals in anonymizing activities, including fraud and ransomware.

Relationship graph between bddns[.]cc, proxy[.]am and 109.235.81[.]104_ SOURCE - bitsight.com
Relationship graph between bddns[.]cc, proxy[.]am and 109.235.81[.]104_ SOURCE – bitsight.com

Rounding Up

The revelation that Socks5Systemz botnet powers Proxy.AM highlights the evolving nature of cyber threats. As malware becomes more sophisticated, security experts and organizations must remain vigilant.

Bitsight TRACE and other cybersecurity entities play a vital role in uncovering these operations and mitigating their impact.

By shedding light on this cybercrime operation, we aim to raise awareness about the importance of proactive cybersecurity measures. Stay informed and protected!

About Bitsight TRACE

Bitsight TRACE is a leading cybersecurity research and intelligence platform. They specialize in uncovering hidden cyber threats and providing actionable insights to protect organizations worldwide.

FAQ: How Socks5Systemz Botnet Powers Proxy.AM

What is Socks5Systemz?
A: Socks5Systemz is malware that converts hacked devices into proxy exit nodes for anonymity.

How does Proxy.AM use this botnet?
A: Proxy.AM leverages the compromised devices in the botnet to offer proxy services.

Why is this a cybersecurity concern?
A: The botnet enables criminals to mask malicious activities, increasing risks for individuals and organizations.

What countries are most affected?
A: India, Indonesia, and Ukraine are among the top countries with high infections.

How can individuals protect themselves?
A: Regularly update software, use strong passwords, and install reputable antivirus solutions.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More