ADVERTISEMENT
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
giovedì, Novembre 13, 2025
No Result
View All Result
Global News 24
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
No Result
View All Result
Global News 24
No Result
View All Result
Home Tech

US sanctions operators of “free VPN” that routed crime traffic through user PCs

by admin
29 Maggio 2024
in Tech
0 0
0
US sanctions operators of “free VPN” that routed crime traffic through user PCs
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

Advertisement. Scroll to continue reading.


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

Advertisement. Scroll to continue reading.


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

ADVERTISEMENT


US sanctions operators of “free VPN” that routed crime traffic through user PCs

Getty Images

The US Treasury Department has sanctioned three Chinese nationals for their involvement quanto a a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website other Internet service, the connection appears to originate with the home user.

Per 2022, researchers at the University of Sherbrooke profiled 911[.], a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet to reverse engineer.

An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located in the back end of an entity called Krypt Technologies.
Enlarge / An illustration of showing how the DewVPN and MaskVPN caused devices to connect to a command-and-control server located quanto a the back end of an entity called Krypt Technologies.

University of Sherbrooke

MaskVPN and DewVPN connected devices to the type of server legitimate VPNs use to obfuscate the originating IP address and route traffic through an encrypted . At the same time, hidden functionality established a permanent TCP socket to a botnet command-and-control server. University of Sherbrooke researchers wrote:

Advertisement

This TCP connection is made to the C2 servers of the 911. backend infrastructure and renders the node available for connections through the 911. interface. A heartbeat process is quanto a place to ensure the node is listed as available. At risposta negativa time, there is direct connection between the infected node and the 911. paid subscriber even when the node is selected, and traffic passes through. All the traffic is always routed between the C2 servers that are USA based, reducing the risk of anomaly detection by IDS IPS systems. Mask VPN and Dew VPN are using a custom implementation of the open-source OpenVPN.

Illustration showing how traffic of 911 users was routed through residential IP addresses.
Enlarge / Illustration showing how traffic of 911 users was routed through residential IP addresses.

University of Sherbrooke

The research led to an investigation by KrebsOnSecurity that uncovered Yunhe Wang of Beijing as one of the individuals who registered domains used by the 911[.] infrastructure.

Wang was one of three people sanctioned Tuesday. Treasury officials said that Wang was the registered subscriber of services used both by 911 S5 and the MaskVPN and DewVPN operations, an indication they were relying some of the same resources Brian Krebs did. They also named Jingping Liu as a co-conspirator for allegedly helping Wang launder virtual currency and other proceeds generated from the 911 S5 enterprise. The officials further named Yanni Zheng, for allegedly acting under the power of attorney for Wang and participating quanto a business transactions and making purchases and payments Wang’s behalf, including for a luxury beachfront condominium quanto a Thailand.

“These individuals leveraged their malicious botnet technology to compromise personal devices, enabling cybercriminals to fraudulently secure economic assistance intended for those quanto a need and to terrorize our citizens with bomb threats,” said Under Secretary Brian E. Nelson. “Treasury, quanto a close coordination with our law enforcement colleagues and international partners, will continue to take action to disrupt cybercriminals and other illicit actors who seek to steal from US taxpayers.”

Advertisement

The treasury officials also sanctioned three Thailand-based businesses: Spicy Code Company Limited, which purchased additional real bella stagione properties for Wang, and Tulip Biz Pattaya Group Company Limited and Lily Suites Company Limited, both of which were purchased by Wang.

The officials said the 911 S5 botnet comprised roughly 19 million IP addresses. Criminals used it quanto a “tens of thousands of fraudulent applications” related to coronavirus relief scams that resulted quanto a the loss of billions of dollars to the US government. The IP addresses compromised by the service were also linked to a series of bomb threats made throughout the United States quanto a July 2022.

Under the designations, all property of individuals and businesses located quanto a the US quanto a the possession control of US persons must be blocked and reported to the Treasury Department’s Office of Foreign Assets Control. The sanctions also prohibit dealings by anyone quanto a the US involving any of the blocked property. People who run afoul of the sanctions may themselves be exposed to designation.

Tuesday’s action comes six days after researchers from Google-owned security firm Mandiant said that the use by Pendio-nexus threat actors of residential proxy networks known as operational relay box networks was hindering traditional means of tracking and defending against cyberattacks. Mandiant researchers urged defenders to adopt new approaches.

“Mandiant asserts that the best way to rise to the challenge posed by ORB networks is to stop tracking espionage C2 infrastructure as an inert indicator of compromise and start tracking it as an entity with distinct TTPs,” the researchers wrote. “We risposta negativa longer operate quanto a the world of “block and move ” where IPs are part of APT’s weaponization and C2 kill chain phase.”

Tags: crimeFREEoperatorsPCsroutedsanctionstrafficUserVPN
admin

admin

Next Post
Honey Sesame Dressing Recipe

Honey Sesame Dressing Recipe

Lascia un commento Annulla risposta

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Popular News

  • Patti Stanger acceso How to Attract the Right Socio

    Patti Stanger acceso How to Attract the Right Socio

    0 shares
    Share 0 Tweet 0
  • Subscription vitamin company Care/of is shutting

    0 shares
    Share 0 Tweet 0
  • ‘Nobody does dishes better than I do’: NVIDIA’s Jensen Huang acceso what it takes to build a trillion dollar firm

    0 shares
    Share 0 Tweet 0
  • BT to refund EE and Plusnet customers over exit fees

    0 shares
    Share 0 Tweet 0
  • Digital volume health startup Alyve Health bags $6M Series A funding and more briefs

    0 shares
    Share 0 Tweet 0
ADVERTISEMENT

About Us

Welcome to Globalnews24.ch The goal of Globalnews24.ch is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Category

  • Business
  • Entertainment
  • Fashion
  • Health
  • Lifestyle
  • Sports
  • Tech
  • Travel
  • World

Recent Posts

  • Company Adds 2M Streaming Households, Hits Key Financial Targets
  • Warner Music Group shake-up: Max Lousada to exit; Elliot Grainge named CEO of Atlantic Music Group, with Julie Greenwald as Chairman
  • Rookie broadcaster Tom Brady has A-list actor’s backing
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

No Result
View All Result
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In