Researchers from HUMAN’s Satori Threat Intelligence discovered a significant number of VPN apps on Android phones that, without users' knowledge, turned their devices into criminal proxies as part of a campaign named PROXYLIB. Cybercriminals and state actors use proxies to hide their activities, making it harder for them to be caught. They found 28 apps on Google Play that did this, including 17 free VPNs, which have since been removed. The apps used a shared code library, PROXYLIB, to enroll devices into the criminal network. HUMAN also found hundreds of apps in third-party repositories that appeared to use the LumiApps toolkit, a Software Development Kit (SDK) which can be used to load PROXYLIB. They also tied PROXYLIB to another platform that specializes in selling access to proxy nodes, called Asocks.
Residential proxies are a network of proxy servers sourced from real IP addresses provided by internet service providers (ISPs), helping users hide their actual IP addresses by routing their internet traffic through an intermediary server. The anonymity benefits aside, they are ripe for abuse by threat actors to not only obfuscate their origins but also to conduct a wide range of attacks. Many threat actors purchase access to these networks to facilitate their operations. Some of these networks can be created by malware operators tricking unsuspecting users into installing bogus apps that essentially corral the devices into a botnet that's then monetized for profit by selling the access to other customers.
The Android VPN apps discovered by HUMAN are designed to establish contact with a remote server, enroll the infected device to the network, and process any request from the proxy network. This operation has been codenamed PROXYLIB by the company. The 29 apps in question have since been removed by Google. The anonymity benefits of residential proxies allow threat actors to not only hide their origins but also to conduct a wide range of attacks, including advertising fraud, password spraying, and credential stuffing attacks.
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib-and-lumiapps-transform-mobile-devices-into-proxy-nodes
#cybersecurity #android #malware #vpn #proxylib #google #googleplay #apps #lumiapps #sdk #proxy #asocks #network #server #passwordspraying #humansecurity #satori #threatintelligence