A large set of data was recently published on DDoSecrets.com, allegedly taken from a computer used by a hacker group targeting South Korean and Taiwanese organizations. The leak is believed to be linked to the North Korean hacking group Kimsuky, known for its spying activities. Although the identity of the group hasn’t been confirmed, the data offers useful clues about how they operate, especially their use of tools to hide their online activity. Spur, a firm specializing in VPN and proxy traffic analysis, identified a significant IP address in the leak: 156[.]59[.]13[.]153. This IP used a unique SSL certificate and was running on an unusual port (4012). When Spur investigated further, they found over 1,000 similar IPs, mostly in China, suggesting a well-organized proxy network. This network appears to use the Trojan protocol, which disguises internet traffic to bypass China’s internet restrictions. Researchers found links to a Chinese VPN service called WgetCloud (formerly GaCloud), which sells access to these proxies. By subscribing to WgetCloud, Spur confirmed that the leaked IPs were part of its infrastructure. The service has around 1,700 proxy nodes in various countries, making it attractive for hackers who want to hide their tracks. This case shows how advanced hacking groups may use commercial proxy services to mix their malicious traffic with regular internet use, making it harder to detect and trace. Spur has now flagged all WgetCloud-related IPs in its systems to help others identify and block them.As these proxy tools evolve, cybersecurity teams need to improve their methods for identifying suspicious IPs and uncovering hidden networks to better defend against ongoing threats.
A newly uncovered cyber espionage campaign, named PassiveNeuron, is targeting government, financial, and industrial entities across Asia, Africa, and Latin America, according to ne...
The cybercrime landscape involving stealer malware has expanded to an unprecedented level, with criminals processing millions of stolen credentials daily through complex networks. ...
SharkStealer, a Golang-based information stealer, employs an innovative method for covert communication by abusing the Binance Smart Chain (BSC) Testnet. Instead of relying on trad...