Research & Intelligence
Deep dives into internet infrastructure, threat actor tradecraft, and data analysis from the Synthient team.
Stay updated
Get the latest research delivered directly to your inbox.
INITIALIZING...
Deep dives into internet infrastructure, threat actor tradecraft, and data analysis from the Synthient team.
Get the latest research delivered directly to your inbox.
A look into the internals behind a large-scale proxy operation, from the sourcing of IPs to the platform itself. How proxy providers utilize everything from TV boxes to free software for building out a pool of unique proxies.


In early November of last year Synthient would take on a research project to map out the cybercrime ecosystem. In that effort we would go on to ingest several billion credentials from combolists, stealer logs and database dumps.

This blog post explores the Malware as a Service (MAAS) ecosystem and its adoption of GhostSocks the proxy based malware.

Residential proxies pose numerous challenges to online platforms. Static indicators fall short, with residential proxy providers using sketchy mobile SDKs or free VPN apps to build large pools of IP addresses. Attackers can use these IP addresses to conceal their attacks making it appear as if each request is coming from a legitimate device. This latest release of Synthient V3 aims to improve the identification of leased IP addresses and the detection of active proxies...

Synthient was founded over a year ago out of a necessity to build better cybersecurity products. Learn what the values are and how that has shaped the company. Everything from our work to the products we build is built from these ideas.