Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

This top VC bets nearly 20% of its money on teenagers – here’s why

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 1,500 VPS victims daily across SystemBC Powers Rem Proxy 80 C2 servers
Identity

1,500 VPS victims daily across SystemBC Powers Rem Proxy 80 C2 servers

userBy userSeptember 19, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 19, 2025Ravi LakshmananBotnet/Network Security

The proxy network, known as Lem Proxy, is powered by malware known as SystemBC, which provides users with around 80% of the botnet, according to a new survey from the Black Lotus Labs team at Lumen Technologies.

“Rem Proxy is a considerable network, selling a pool of 20,000 Mikrotik routers and a variety of open proxies that are freely available online,” said a report shared with Hacker News. “The service is a favorite for several actors, including the actor behind Transferloader, which is linked to the Morpheus Ransomware group.”

SystemBC is C-based malware that turns an infected computer into a Socks5 proxy, allowing infected hosts to communicate with command and control (C2) servers and download additional payloads. This way, first documented by ProofPoint in 2019, can be targeted to both Windows and Linux systems.

In a report earlier this January, Any.Run revealed that the Linux variant of the SystemBC proxy implant may be designed for internal corporate services and is primarily used to target corporate networks, cloud servers and IoT devices.

DFIR Retainer Service

Usually, as with proxy solutions, users on the network reach out to SystemBC C2S on advanced ports, then route the user to one of the victims before reaching their destination.

According to Lumen, SystemBC BOTNET consists of over 80 C2 servers and an average of 1,500 victims per day, nearly 80% of which have been damaged by virtual private server (VPS) systems from several large commercial providers. Interestingly, 300 of these victims are part of another botnet called Gobruteforcer (aka Gobrut).

Of these, nearly 40% of compromises have a “very long average” infection lifespan, lasting for 31 days. Worse, the majority of victimized servers are known to be susceptible to some known security flaws. Each victim has an average of 20 unpatched CVEs and at least one important CVE, with one of the identified VPS servers in the city of Atlanta, USA vulnerable to over 160 unpaid CVEs.

“The victims are now proxies that allow for large amounts of malicious traffic for use by numerous crime threat groups,” the company said. “By operating a VPS system instead of a device in a residential IP space, SystemBC can provide a proxy that provides large volumes for a long time, as is typical in a malware-based proxy network.”

In addition to REM proxying, some of SystemBC’s other customers include at least two different Russian-based proxy services, one Vietnamese proxy service called VN5Socks (aka ShopSocks5), and a Russian web scraping service.

The key to the functionality of the malware is the IP address 104.250.164.[.]214 appears to be the source of attacks not only to host artifacts, but also to recruit potential victims. When a new victim is seduced, a shell script is dropped onto the machine, and the malware is then delivered.

Botnets work with little stealth consideration, and the main goal is to expand the volume to hold as many devices as possible into the botnet. One of the biggest use cases for illegal networks comes from threat actors behind SystemBC itself.

CIS Build Kit

The ultimate goal is likely to sell harvested qualifications to other criminals on the Underground Forum, then weaponize them to inject malicious code into the problematic site for their next campaign.

“SystemBC has demonstrated sustainable activity and operational resilience over the years, establishing it as a sustainable vector within a cyber threat landscape,” Lumen said. “The platform originally used by threat actors to enable ransomware campaigns has evolved to provide custom botnet assembly and sales.”

“Their model offers considerable advantages, allowing widespread reconnaissance, spam spreading, and related activities to carry out, allowing attackers to reserve more selective proxy resources for targeted attacks notified by previous intelligence collections.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow developers use Apple’s local AI model on iOS26
Next Article Octopus Energy spins Kraken utility billing and AI platform
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

This top VC bets nearly 20% of its money on teenagers – here’s why

YouTubers are no longer dependent on ad revenue — how some YouTubers are diversifying

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.