Research & Intelligence
Deep dives into internet infrastructure, threat actor tradecraft, and data analysis from the Synthient team.
Stay updated
Get the latest research delivered directly to your inbox.
INITIALIZING...
Deep dives into internet infrastructure, threat actor tradecraft, and data analysis from the Synthient team.
Get the latest research delivered directly to your inbox.

A look into the internals behind a large-scale proxy operation, from the sourcing of IPs to the platform itself. How proxy providers utilize everything from TV boxes to free software for building out a pool of unique proxies.

In early November of last year Synthient would take on a research project to map out the cybercrime ecosystem. In that effort we would go on to ingest several billion credentials from combolists, stealer logs and database dumps.