Original Article Text

Click to Toggle View

Police dismantles botnet selling hacked routers as residential proxies. Law enforcement authorities have dismantled a botnet that infected thousands of routers over the last 20 years to build two networks of residential proxies known as Anyproxy and 5socks. The U.S. Justice Department also indicted three Russian nationals (Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, and Aleksandr Aleksandrovich Shishkin) and a Kazakhstani (Dmitriy Rubtsov) for their involvement in operating, maintaining, and profiting from these two illegal services. During this joint action dubbed 'Operation Moonlander,' U.S. authorities worked with prosecutors and investigators from the Dutch National Police, the Netherlands Public Prosecution Service (Openbaar Ministerie), and the Royal Thai Police, as well as analysts with Lumen Technologies' Black Lotus Labs. Court documents show that the now-dismantled botnet infected older wireless internet routers worldwide with malware since at least 2004, allowing unauthorized access to compromised devices to be sold as proxy servers on Anyproxy.net and 5socks.net. The two domains were managed by a Virginia-based company and hosted on servers globally. Their users paid a monthly subscription ranging from $9.95 to $110 per month, depending on the requested services. "The website's slogan, 'Working since 2004!,' indicates that the service has been available for more than 20 years," the Justice Department said today. The four defendants advertised the two services (promoting over 7,000 proxies) as residential proxy services on various websites, including ones used by cybercriminals, and they allegedly collected over $46 million from selling subscriptions providing access to the infected routers part of the Anyproxy botnet. They operated the Anyproxy.net and 5socks.net websites using servers registered and hosted at JCS Fedora Communications, a Russian internet hosting provider. They also used servers in the Netherlands, Türkiye, and other locations to manage the Anyproxy botnet and the two websites. The four defendants were charged with conspiracy and damage to protected computers, while Chertkov and Rubtsov were also accused of falsely registering a domain name. Targeting end-of-life (EoL) routers On Wednesday, the FBI also issued a flash advisory and a public service announcement warning that this botnet was targeting patch end-of-life (EoL) routers with a variant of the TheMoon malware. The FBI warned that the attackers are installing proxies later used to evade detection during cybercrime-for-hire activities, cryptocurrency theft attacks, and other illegal operations. The list of devices commonly targeted by the botnet includes Linksys and Cisco router models, including: "Recently, some routers at end of life, with remote administration turned on, were identified as compromised by a new variant of TheMoon malware. This malware allows cyber actors to install proxies on unsuspecting victim routers and conduct cyber crimes anonymously," the FBI said. "Such residential proxy services are particularly useful to criminal hackers to provide anonymity when committing cybercrimes; residential-as opposed to commercial—IP addresses are generally assumed by internet security services as much more likely to be legitimate traffic," today's indictment added. "In this way, conspirators obtained a private financial gain from the sale of access to the compromised routers." Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

CYBERCRIME // Global Law Enforcement Dismantles Router-Based Botnet and Proxy Service

Law enforcement has disrupted a botnet, including two proxy services, operating for over 20 years and led to the indictment of four individuals from Russia and Kazakhstan.

The botnet, utilizing Anyproxy and 5socks networks, compromised thousands of end-of-life routers globally, turning them into residential proxies.

The malicious network, which sold accesses via a subscription model, has reportedly collected over $46 million through its operations.

Operation Moonlander involved cooperation between the U.S. Justice Department, Royal Thai Police, Dutch National Police, and others, demonstrating significant international collaboration.

The U.S. Justice Department highlighted that the networks leveraged by cybercriminals helped anonymize activities such as cyber-for-hire offenses and cryptocurrency theft.

The FBI has issued warnings about the botnet, which targets outdated routers with TheMoon malware, advising the public on potential security vulnerabilities.

The dismantlement of the botnet and the arrests have been a crucial step in mitigating a longstanding global cybersecurity threat.