New Krebs Findings On Bulletproof Proxy Networks & Automated Cyber Threats

In response to findings published today in Krebs on Security on The Rise of “Bulletproof” Residential Networks, an expert with Cequence Security offers perspective on Brian Krebs’ research and Cequence Security’s own recent findings on Bulletproof Proxy Networks.

Experts Comments

August 20, 2019
Will Glazier
Head of CQ Prime Research
Cequence Security
The information in the article validates what we are seeing on our customer networks and what we recently documented in our research report Bulletproof Proxies: The Evolution of the Cybercriminal Infrastructure. For example, between Q1-Q2 2019, automated threats targeting financial services and retail customer environments emanating from these types of networks skyrocketed to 518% and 800% respectively. "These large scale networks of residential IP addresses act as proxies for bad actors to.....Read More
The information in the article validates what we are seeing on our customer networks and what we recently documented in our research report Bulletproof Proxies: The Evolution of the Cybercriminal Infrastructure. For example, between Q1-Q2 2019, automated threats targeting financial services and retail customer environments emanating from these types of networks skyrocketed to 518% and 800% respectively. "These large scale networks of residential IP addresses act as proxies for bad actors to launch their attacks and because they are residential in nature, they appear legitimate, and less likely to be discovered and blocked. When combined with attack automation and the continually refreshed supply of compromised user credentials, bad actors can create and launch sophisticated campaigns that hide in plain sight within the legitimate transactions. "There is still much more to learn about how these networks operate, but the completeness of the article is welcoming in the efforts to protect our customers web, mobile and API-based applications.  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.