Research & Intelligence
Deep dives into internet infrastructure, threat actor tradecraft, and data analysis from the Synthient team.
Stay updated
Get the latest research delivered directly to your inbox.
INITIALIZING...
Deep dives into internet infrastructure, threat actor tradecraft, and data analysis from the Synthient team.
Get the latest research delivered directly to your inbox.

A look into the internals behind a large-scale proxy operation, from the sourcing of IPs to the platform itself. How proxy providers utilize everything from TV boxes to free software for building out a pool of unique proxies.

This blog post explores the Malware as a Service (MAAS) ecosystem and its adoption of GhostSocks the proxy based malware.

Residential proxies pose numerous challenges to online platforms. Static indicators fall short, with residential proxy providers using sketchy mobile SDKs or free VPN apps to build large pools of IP addresses. Attackers can use these IP addresses to conceal their attacks making it appear as if each request is coming from a legitimate device. This latest release of Synthient V3 aims to improve the identification of leased IP addresses and the detection of active proxies...