Proxyjacking for Profit: The Latest Cybercriminal Side Hustle

Sdílet
Vložit
  • čas přidán 5. 08. 2024
  • Talk by Allen West
    www.socallinuxexpo.org/scale/...
    In the evolving landscape of cyber threats, proxyjacking for profit is emerging as a silent adversary. While the cyber realm is familiar with hijacking resources for cryptomining and conventional malicious uses of proxies, exploiting victims' bandwidth for direct and tangible profit is a newer challenge. This presentation delves into the intricacies of proxyjacking and its challenges for cybersecurity defenders. Attendees will gain insights into its prevalence, potential future trajectories, and, crucially, defensive measures to combat this under-discussed threat.
  • Věda a technologie

Komentáře • 50

  • @zgintasz
    @zgintasz Před 21 dnem +8

    Is this new? I suspected proxyjacking the first time I saw a service named “residential proxies”

  • @eyezikandexploits
    @eyezikandexploits Před měsícem +11

    Great talk loved the breakdown

  • @KIP-lh1ln
    @KIP-lh1ln Před 23 dny +4

    I see proxyjacking as a risk to the victims, as high risk traffic could be tunneled to these unsuspecting victims.

  • @Lugnear
    @Lugnear Před 21 dnem +3

    Hello did you inform the the libyan company of there website ? I am in libya now and very interested in investigating it

  • @andresdelorbe9638
    @andresdelorbe9638 Před 29 dny +11

    I really miss the old linode logo !

  • @gooniesfan7911
    @gooniesfan7911 Před měsícem +9

    im hearing impaired and the transcript is hard to search through. is this vulnerability involving modifying DNS requests via the proxy end?

    • @CyberSnakeEater
      @CyberSnakeEater Před měsícem +1

      I just started watching so i can't answer, but maybe you could benefit from a strategy I use to study: I copy and paste the transcript into an AI and ask it questions

    • @bearwolffish
      @bearwolffish Před 29 dny +4

      @@CyberSnakeEater You verify the answers the AI gives you?

    • @rxpe
      @rxpe Před 29 dny +2

      Via the proxy end? It's just using infected machines as proxies and selling their access.

    • @MacGuffin1
      @MacGuffin1 Před 27 dny

      Yeah IU cant read his overhead stuff on a very large screen in 4k :[

  • @BillAnt
    @BillAnt Před měsícem +31

    A proxy is similar to a VPN for changing different static or dynamic IP's. The only difference difference is that a VPN also encrypts the DNS requests. I'm using a proxy every day for my business to access certain sites, because changing IP's forces me to log in an verify it again the IP again. It's a completely legit use.

    • @bobbyrandomguy1489
      @bobbyrandomguy1489 Před měsícem +11

      A proxy does not inherently promise encryption. All VPN connections provide encryption. Just make sure you use the correct protocols!

    • @BillAnt
      @BillAnt Před měsícem

      ​@@bobbyrandomguy1489 - That what I said, a proxy is just for changing IP's. But with 99% of websites nowadays the actual traffic is encrypted via HTTPS/TTS. The only things a VPN is better at, is hiding DNS queries so an attacker won't know the url/IP of the sites you're visiting. Honestly I don't trust either proxy and VPN services, could be honey-pots all we know. "Trust me bro, no logs!" lmao

    • @exciteproductions4two0
      @exciteproductions4two0 Před 29 dny

      ​@@bobbyrandomguy1489tell that to lemons vpn after they sold all their customers information to a Chinese web company.

    • @Heapsray
      @Heapsray Před 28 dny +2

      This claim is false

    • @Heapsray
      @Heapsray Před 28 dny +8

      A VPN completely replicates the network stack and encapsulates it in an encrypted way, while a proxy just forwards requests for you and acts as man-in-the-middle

  • @rebane2001
    @rebane2001 Před 27 dny +3

    16:35 no thats not the right hackernews 😭

  • @Akash.Chopra
    @Akash.Chopra Před 27 dny +8

    Please move the mic away from the center of your mouth bro..

  • @youssefaghayou6875
    @youssefaghayou6875 Před 14 dny

    W

  • @ChantelleMylanz-v7b
    @ChantelleMylanz-v7b Před 17 dny +1

    This is evil

  • @nevergoon4315
    @nevergoon4315 Před měsícem +31

    This talk is easily 14 years out of relevance.

    • @andrewferguson6901
      @andrewferguson6901 Před měsícem +36

      That would mean something if vulnerabilities 14 years out of relevance werent still being exploited for fun and profit

    • @nevergoon4315
      @nevergoon4315 Před měsícem +1

      ​@@andrewferguson6901 Fun and profit is a dog-headed point of view. Do you think you are better than a dog?
      The most successful hackers are god-headed political idealogues with tragic tales; not run of the mill crooks or goons.
      Political idealogues look at crypto and networking technology companies and sees it for what it is. State-sponsored fascism with a bunch of pretty graphs.
      If you can't learn to understand the motives of your adversaries you can never hope to stop them, much less compete with them.
      Low-brow attacks like what this talk covers only exists because this country is one large honeypot.
      Hackers know better than professionals what is real and what is not.

    • @ericschroeman5020
      @ericschroeman5020 Před měsícem +12

      eh not really, some is old info but most is pretty current

    • @bezillions
      @bezillions Před měsícem +20

      If it's not patched or moot it's relevant

  • @vuufke4327
    @vuufke4327 Před měsícem +11

    Entirely useless talk, save you time.

    • @MouadScriptz
      @MouadScriptz Před 29 dny +4

      not true

    • @frag0638
      @frag0638 Před 29 dny +7

      This is 15 years late

    • @vuufke4327
      @vuufke4327 Před 29 dny

      @@frag0638 proxyjacking has been a thing pretty much from the day smartphones became popular, I wouldn't call it "the latest side hustle"

    • @corpingtons
      @corpingtons Před 29 dny +5

      How is it useless it’s still being used? If a computer has malware anything is possible if it’s ud