www.itfunk.orgwww.itfunk.orgwww.itfunk.org
  • Home
  • Tech News
    Tech NewsShow More
    Zero Trust: How a Security Idea Became a Blueprint
    41 Min Read
    Cybersecurity Law Expiration Could Unleash New Ransomware Surge – Former FBI Official Sounds the Alarm
    8 Min Read
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
    6 Min Read
    Agentic AI: The Next Frontier in Cybersecurity Defense and Risk​
    5 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Vulnerabilities
  • How To Guides
    How To GuidesShow More
    Tasksche.exe Malware
    Nviqri Someq Utils Unwanted Application
    4 Min Read
    How to Deal With Rbx.fund Scam
    4 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
    Why Streaming Services Geo-Restrict Content?
    10 Min Read
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    IT/Cybersecurity Best PracticesShow More
    Zero Trust: How a Security Idea Became a Blueprint
    41 Min Read
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    Affordable Endpoint Protection Platforms (EPP) for Small Businesses
    5 Min Read
    Outlaw Malware: A Persistent Threat Exploiting Linux Servers
    4 Min Read
    CVE-2024-48248: Critical NAKIVO Backup & Replication Flaw Actively Exploited—Patch Immediately
    6 Min Read
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org. All Rights Reserved.
Reading: Socks5Systemz Botnet: Thousands of Devices Infected
Share
Notification Show More
Font ResizerAa
www.itfunk.orgwww.itfunk.org
Font ResizerAa
  • Tech News
  • How To Guides
  • Cyber Threats
  • Product Reviews
  • Cybersecurity for Business
  • Free Scan
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • Cybersecurity for Business
  • FREE SCAN
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org All Rights Reserved.
www.itfunk.org > Blog > Tech News > Socks5Systemz Botnet: Thousands of Devices Infected
Tech News

Socks5Systemz Botnet: Thousands of Devices Infected

ITFunk Research
Last updated: November 8, 2023 7:27 pm
ITFunk Research
Share
Socks5Systemz Botnet: Thousands of Devices Infected
SHARE

Cybersecurity researchers from BitSight have uncovered a proxy botnet called Socks5Systemz, which has been operating since at least 2016 and has remained relatively under the radar. This proxy botnet is delivered through the PrivateLoader and Amadey loaders. It is named after the consistent login panel found on all the Command and Control (C2) servers.

Contents
What is Socks5Systemz?Infection and PersistenceCommunication CommandsGeographical ImpactSubscription PlansRemoval Guide for Socks5Systemz BotnetStep 1: Isolate Infected DevicesStep 2: Disconnect from the InternetStep 3: Run a Full System ScanStep 4: Follow Software RecommendationsStep 5: Update Operating System and SoftwareStep 6: Change PasswordsStep 7: Secure Your NetworkStep 8: Educate UsersStep 9: Monitor for Unusual ActivityStep 10: Consult a ProfessionalConclusion

What is Socks5Systemz?

The Socks5Systemz botnet offers traffic-forwarding proxies for illicit purposes, charging prices ranging from $1 to $140 per day in cryptocurrency. It has infected approximately 10,000 systems, with a notable absence of infected systems in Russia.

Infection and Persistence

The botnet’s samples are distributed via PrivateLoader and Amadey and execute a file named “previewer.exe.” This file establishes persistence and injects the proxy bot into memory. The loader ensures persistence by creating a Windows service with the name and display name set to “ContentDWSvc.” To avoid detection and enhance resistance to takedown, the proxy bot employs a domain generation algorithm (DGA).

Communication Commands

A crucial command used by Socks5Systemz is the “connect” command. This command instructs the bot to establish a session with a backconnect server on port 1074/TCP. Once the session is established, the bot functions as a proxy. Clients need to know the backconnect server’s IP address, the TCP port assigned to the infected system, and have the correct login credentials to use the proxy.

Geographical Impact

Researchers have identified at least 53 servers used by the botnet, all located in Europe, spanning countries like France, Bulgaria, Netherlands, and Sweden. The top 10 most affected countries by Socks5Systemz include India, Brazil, Colombia, South Africa, Bangladesh, Argentina, Angola, the United States, Suriname, and Nigeria.

Subscription Plans

The threat actors behind the Socks5Systemz botnet offer two subscription plans: ‘Standard’ and ‘VIP.’ Customers can make payments using the Cryptomus Crypto Payment Gateway at cryptomus.com.

Socks5Systemz represents an ongoing challenge for cybersecurity experts, and its use of proxies for illicit purposes highlights the need for constant vigilance in the battle against evolving cyber threats.

By uncovering and analyzing the tactics and techniques employed by botnets like Socks5Systemz, researchers can develop countermeasures to protect users and organizations from these malicious activities.

Removal Guide for Socks5Systemz Botnet

If you suspect that your device has been infected by the Socks5Systemz botnet, it’s crucial to take immediate action to remove the threat and secure your system. Follow these steps to remove Socks5Systemz from your computer:

Step 1: Isolate Infected Devices

  • If you have identified an infected device in your network, isolate it from the rest of your devices to prevent further spread of the infection.

Step 2: Disconnect from the Internet

  • Temporarily disconnect the infected device from the internet to prevent any further communication with the botnet’s Command and Control servers.

Step 3: Run a Full System Scan

  • Use a reputable and up-to-date antivirus or anti-malware software to perform a full system scan on the infected device. Ensure that the security software is capable of detecting and removing botnet-related malware.

Step 4: Follow Software Recommendations

  • Follow the recommendations provided by your security software to quarantine or remove any identified threats related to the Socks5Systemz botnet. This may involve deleting or isolating malicious files and processes.

Step 5: Update Operating System and Software

  • Make sure your operating system and all installed software are up to date with the latest security patches and updates. Botnets often exploit vulnerabilities in outdated software.

Step 6: Change Passwords

  • After removing the botnet, change passwords for all your online accounts, including email, social media, and banking, to prevent unauthorized access to your accounts.

Step 7: Secure Your Network

  • Review your network security settings and consider enhancing your network’s security measures. Ensure your firewall is active, and update router firmware if needed.

Step 8: Educate Users

  • If the infected device is part of a larger network, educate users on the importance of cybersecurity best practices to prevent future infections.

Step 9: Monitor for Unusual Activity

  • Continuously monitor your network for any unusual or suspicious activity that may indicate a re-infection by the botnet.

Step 10: Consult a Professional

  • If you are unsure about the removal process or suspect that your device’s security may have been compromised, consider consulting a cybersecurity professional or your organization’s IT department for assistance.

Remember that botnet infections can be complex, and removing them may require expertise. Prevention through regular software updates, strong passwords, and safe online practices is key to avoiding future infections.

By following these steps and staying vigilant, you can effectively remove the Socks5Systemz botnet from your device and take measures to prevent future infections.

Conclusion

The emergence of the Socks5Systemz proxy botnet highlights the ever-evolving landscape of cyber threats and the adaptability of malicious actors. Operating under the radar for years, this botnet has infected thousands of devices and is actively providing traffic-forwarding proxies for illicit purposes, generating significant profits for its operators.

As cybersecurity experts and organizations work to identify and counter such threats, it’s clear that the battle against cybercriminals is ongoing and requires constant vigilance. The Socks5Systemz botnet serves as a reminder of the need for robust security measures, regular updates, and user education to protect against evolving cyber threats.

Removing the Socks5Systemz botnet from infected devices is essential, and a comprehensive removal guide has been provided to assist users in this process. However, prevention remains the most effective strategy against botnet infections, and users should prioritize cybersecurity best practices to safeguard their systems and data.

By staying informed, implementing security measures, and collaborating in the fight against botnets and other cyber threats, individuals and organizations can enhance their digital defenses and contribute to a safer online environment for all.

You Might Also Like

Zero Trust: How a Security Idea Became a Blueprint
Cybersecurity Law Expiration Could Unleash New Ransomware Surge – Former FBI Official Sounds the Alarm
Croursem.co.in Ads
Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
TAGGED:MalwareTech News

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article SecuriDropper: Android’s New Threat Landscape
Next Article STOP/Djvu Ransomware Dealing with the JZEQ Ransomware Infection
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Malware

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

Download SpyHunter 5
Download SpyHunter for Mac
✅ Free Scan Available • ⭐ Catches malware instantly
//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Support

Sign Up for Our Newesletter

Subscribe to our newsletter to get our newest articles instantly!

 

www.itfunk.orgwww.itfunk.org
© 2023 www.itfunk.org. All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?