![]() ![]() Growing Proxyware Trend Presents Cybersecurity Challenges Consumers accruing bandwidth overage fees when running app on a mobile device.Businesses using proxyshare platforms potentially exposing unencrypted internet traffic to malicious hosts.Employee abuse of company networks running the app or multiple versions of the service.Corporate networks exposed to malicious versions of proxyware.Malicious or trojan-ized versions of bandwidth-sharing application distributed by adversaries.Researchers found that abuse of the services – by consumers and adversaries – present a myriad of risks, including: Why Are Proxyware Services Potentially Dangerous? ![]() Uses also include testing potential online advertising campaigns or circumventing commercial network restrictions.įor consumers, Cisco points out, proxyware services are “advertised as a means to circumvent geolocation checks on streaming or gaming platforms,” while at the same time allowing consumers to generate income for the use of their bandwidth. The ability to access residential and geographically diverse IP addresses can be extremely helpful. Proxyware services are attractive to businesses that use them for internet-related traffic research, such as search engine optimization. Apps fall into a category called proxyware, because they turn the device running the software into a type of proxy server. Services are delivered as desktop and mobile applications. “These relatively new platforms were built with a legitimate purpose, but attackers quickly found ways to abuse them,” according to a report by Cisco Talos posted Tuesday. The burgeoning business model is growing in popularity with consumers who earn about $1 for every 10GB of their bandwidth shared with services that include Honeygain, Nanowire, IPRoyal Pawns, Peer2Profit and PacketStream. It is common for different vendors' implementations of standards to require tweaking in order to work with other vendors' implementations.Services that allow consumers to resell their own internet bandwidth for profit to businesses that want to resell it are ripe for abuse, according to researchers. The company says it will use its Copper Compliant labs to certify that its implementation of EOC is compatible with EOC-compliant equipment made by other vendors. Interoperability will make it possible for service providers to use a single IAD from several different vendors, which should help promote competition and drive down prices.ĬopperCom says its MRX IADs as well as its CopperCom Gateway packet switch are compliant with the EOC standard. Many vendors have made their management protocols interoperable with those of other vendors on a case-by-case basis, and adopting the standard makes this interoperability much easier to attain. There the stream is sorted by a packet switch that acts as a gateway to data networks and traditional voice networks. IADs combine voice and data from customers into a single packet stream that is carried over a DSL line into the carrier network. Vendors including CopperCom already had proprietary methods of making these links between their own switches and the customer site equipment, known as integrated access devices (IAD). ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |