In a recent cybersecurity revelation, a proxy botnet known as ‘Socks5Systemz’ has emerged as a significant threat. This malware has managed to compromise around 10,000 devices across the globe, transforming infected computers into proxies. These proxies are then used to forward traffic for various malicious purposes. Subscribers to this service pay between $1 and $140 per day, using cryptocurrency, to exploit these compromised systems.

The Mechanism of Infection

The ‘Socks5Systemz’ botnet employs ‘PrivateLoader’ and ‘Amadey’ malware loaders to infect computers. These malware loaders spread through several channels, including phishing attempts, exploit kits, malicious online advertising (also known as malvertising), and trojanized executable files from peer-to-peer (P2P) networks. Once a computer is infected, the malware injects the proxy bot into the computer’s memory and establishes its persistence through a Windows service named ‘ContentDWSvc.’

Technical Anatomy of the Bot

The payload of this proxy bot is a 300 KB 32-bit Dynamic Link Library (DLL) file, utilizing a Domain Generation Algorithm (DGA) to establish communication with its command and control (C2) server. This connection allows the compromised device to be used as a proxy server, available for sale to other malicious actors. BitSight, a cybersecurity firm, has identified a complex control infrastructure supporting this botnet, consisting of 53 servers spread across Europe, with a significant presence in France, the Netherlands, Sweden, and Bulgaria.

Impact and Distribution

Since October, approximately 10,000 distinct communication attempts with the identified backconnect servers indicate the scale of this infection. The compromised devices, now part of this botnet, span across the globe, with notable concentrations in countries like India, the United States, Brazil, Colombia, South Africa, Argentina, and Nigeria. This widespread distribution highlights the global impact of the Socks5Systemz proxy service.

Recommendations for Protection

To mitigate the threat posed by the Socks5Systemz botnet and similar cyber threats, several measures are recommended:

  • Regular Software Patching: Keep all software and systems up-to-date to prevent exploitation of known vulnerabilities.
  • Security Awareness Training: Empower employees to recognize and respond to phishing attempts and malicious links.
  • URL Filtering: Proactively block access to known malicious websites.
  • Email Security: Implement solutions to prevent opening of malicious email attachments or enabling of macros.
  • DNS Security Solutions: Deploy DNS security solutions to detect and block communication with C2 servers.
  • Anti-DGA Technology: Utilize technology that identifies activities associated with DGAs to block malicious sites.

Ending Note

The global spread of the Socks5Systemz botnet underscores the importance of vigilance and proactive security measures in today’s digital landscape. By understanding the mechanisms of such threats and implementing recommended protective measures, individuals and organizations can significantly reduce their risk of compromise. As cyber threats continue to evolve, staying informed and prepared is paramount in the fight against malicious actors and their increasingly sophisticated methods.

Also Read: