Connect with us

Cybersecurity & Privacy

Google Shuts Down Massive Residential Proxy Network Exploiting Millions of Devices

Published

on

New Delhi — Google has successfully dismantled one of the world’s largest residential proxy networks, a move aimed at protecting millions of consumer devices from misuse by cybercriminals and state-linked threat actors. The operation targeted a network known as IPIDEA, which allegedly allowed malicious operators to route internet traffic through hijacked household devices, masking the origin of illicit online activity.

Millions of Devices Removed from Network
The coordinated takedown significantly reduced the pool of compromised devices available to the proxy network. Google’s Threat Intelligence Group (GTIG) led the effort, combining technical safeguards with legal measures. Key domains controlling infected devices were seized with court approval, effectively disrupting the command-and-control infrastructure that powered IPIDEA.

Enhanced Protections for Android Users
As part of the operation, Google rolled out automatic protections through its Play Protect system for Android users. These security measures block malicious activity linked to the proxy network and prevent further exploitation of devices—without requiring any user action.

Network Scale and Complexity Revealed
Investigations revealed that IPIDEA operated under at least 13 different residential proxy brands. This fragmented structure was used to hide the network’s true size and evade detection. Google also identified over 600 Android apps and 3,075 unique Windows files connected to the network, which were allegedly used to enroll devices into the proxy system without clear user consent.

Growing Threat from Residential Proxy Abuse
Security experts say residential proxy abuse has emerged as a major cybersecurity concern. Because traffic originates from legitimate consumer IP addresses, malicious activity often bypasses automated security defenses. This allows cybercriminals to target financial institutions, government systems, and online platforms while exposing individual users to risks such as slower device performance, higher data usage, and potential malware infections.

Broader Implications for Platform Security
The takedown highlights the ongoing challenges of securing app ecosystems against large-scale exploitation. Despite app store review processes and security policies, cybercriminals continue to exploit gaps to distribute harmful tools. Experts emphasize the importance of continuous monitoring, cross-platform intelligence sharing, and legal intervention to keep evolving proxy networks in check.

Ongoing Vigilance Required
Google has stated it will continue to monitor for attempts to rebuild similar proxy infrastructures and strengthen automated detection systems across its platforms. Additional domain seizures, app removals, and technical interventions are possible as part of ongoing efforts to prevent misuse.

Cybersecurity observers note that while the disruption is a major victory, it underscores a growing reality: everyday consumer devices are increasingly on the frontlines of global cyber conflicts.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cybersecurity & Privacy

Iran Engulfed in ‘Digital Fog’ as Cyber Assault Paralyzes Communications

Published

on

By

Amid escalating military tensions in West Asia, Iran is experiencing a massive cyber offensive that has crippled its digital infrastructure. Alongside reported missile strikes and aerial bombardments by the United States and Israel, the country is now facing what experts call a “digital fog,” severely limiting online communication and access to essential services.

Internet Blackouts and Disrupted Services

For over 72 hours, internet access across Iran has been sporadic or completely inaccessible. Government websites, banking platforms, and widely used applications have experienced repeated outages, leaving citizens unable to access critical services. Network analysts report sharp declines in both inbound and outbound traffic, with major portals and mobile apps intermittently shutting down.

State-run networks, key data centers, and communication systems appear to have been targeted in rapid succession. The timing of the attacks coincides with intensified military operations beginning February 28, suggesting a coordinated effort to destabilize both physical and digital infrastructure simultaneously.

Religious App Breach Sparks Alarm

Among the most notable cyber incidents was the reported hacking of “Bade Saba,” a popular religious calendar app with over five million users, including government employees. Users reportedly saw messages urging “accountability” and instructing individuals to lay down arms, sparking widespread concern. While services were partially restored, officials have yet to disclose the full extent of data exposure or system infiltration.

Cybersecurity experts warn that such targeted intrusions could compromise sensitive personal and institutional data, raising broader questions about digital security in times of conflict.

Understanding the “Digital Fog”

The term “digital fog” describes a situation where large-scale cyber disruptions prevent a population from using online services normally. Similar to physical fog, it obstructs visibility—in this case, digital connectivity. Websites fail to load, messaging platforms become unreliable, online banking is delayed or blocked, and access to public information is severely limited.

Experts note that even when connectivity is not fully cut off, throttled internet speeds can render services nearly unusable, effectively paralyzing a nation’s online ecosystem.

Military and Cyber Coordination

Reports indicate that the cyber attacks are part of a synchronized strategy alongside U.S. and Israeli military operations. By targeting both Iran’s physical infrastructure and its digital networks, analysts say the campaign is designed to maximize disruption while limiting direct ground confrontation.

Official statements from affected authorities describe the outages as technical failures, but independent cybersecurity analysts point to patterns consistent with deliberate, external interference.

Civilian and Economic Impact

The blackout has caused severe disruption to daily life. Online transactions, e-commerce platforms, educational tools, and communication services remain unreliable. Businesses report delays, while families struggle to maintain contact amid ongoing messaging failures.

The unfolding situation highlights the growing role of cyber operations in modern warfare, demonstrating how digital attacks can destabilize a country’s internal systems without requiring conventional military engagement.

As of now, no timeline has been provided for the full restoration of Iran’s internet services. Citizens continue to operate under the cloud of this unprecedented digital disruption, with both economic and social systems heavily affected.

Continue Reading

Cybersecurity

Twitter Hacked: Data Of 400 mn Users Up For Sale, Sundar Pichai and Salman Khan On The List

Published

on

By

NEW DELHI: Twitter faces a major security scare as a hacker claims to have accessed personal data of over 400 million users, including high-profile names like Sundar Pichai, CEO of Google, Bollywood actor Salman Khan, Donald Trump Jr., Steve Wozniak, and singer Charlie Puth. The hacker, known online as Ryushi, shared sample data to substantiate the claim.

The alleged breach reportedly includes emails and phone numbers, with the hacker demanding that Twitter or CEO Elon Musk purchase the data to avoid potential fines under the European Union’s General Data Protection Regulation (GDPR). Such fines could reportedly reach up to USD 276 million, similar to penalties faced by other tech companies for large-scale data leaks.

In a message posted online, Ryushi stated:
“Twitter or Elon Musk, if you are reading this, you are already risking a GDPR fine over the 5.4 million user breach. Imagine the fine for a 400 million user breach. Your best option to avoid paying $276 million is to buy this data exclusively.”

Cybersecurity experts have verified portions of the leaked data. Alon Gal, co-founder and chief technology officer at Israel-based cybercrime intelligence firm Hudson Rock, confirmed that the data checked by third parties appears genuine. According to Gal, the breach likely exploited a flaw in Twitter’s API, enabling the hacker to query any email or phone number and retrieve associated Twitter profiles.

This revelation comes in the wake of an ongoing investigation by the Irish Data Protection Commission (DPC) into a previous Twitter data leak affecting 5.4 million users. That earlier incident exposed email addresses, phone numbers, and Twitter handles, highlighting ongoing vulnerabilities in the platform’s data protection measures.

Twitter has yet to issue an official statement on the 400-million-user breach. The incident raises fresh concerns over the social media platform’s ability to safeguard sensitive user information and maintain compliance with global privacy regulations.

Continue Reading

Cybersecurity

Top 10 Daily Cybercrime Brief by FCRF [29.01.2026]: Click here to Know More

Published

on

By

The Future Crime Research Foundation (FCRF), in collaboration with Algoritha Security Pvt. Ltd, presents the top ten cybercrime developments from India and around the world. These curated updates aim to keep readers informed of the latest frauds, scams, and cybersecurity breakthroughs.


1. Bengaluru Tech Professional Loses ₹2.32 Lakh to Fake Traffic Challan Link

A Bengaluru-based tech professional was defrauded of ₹2.32 lakh after clicking a fraudulent SMS link claiming to be a traffic challan. The link redirected him to a fake payment portal. Police have registered a case and warned the public against suspicious links.

2. Elderly Investor Scammed of ₹2.2 Crore in Online Auto-Trading Fraud

An elderly man lost ₹2.2 crore to a fake online auto-trading platform promising high returns. The fraudsters repeatedly convinced him to invest, siphoning funds through multiple accounts. Investigations are ongoing.

3. Hyderabad Resident Duped Through Malicious Doctor Appointment App

A Hyderabad man lost over ₹4 lakh after installing a fake doctor appointment app containing malware. Cybercriminals accessed his banking details and stole funds. Authorities urge users to download apps only from official sources.

4. Secunderabad Man Loses ₹55 Lakh in Online Betting Scam; One Arrested

A Secunderabad resident was cheated of ₹55 lakh through illegal online betting platforms. Police have arrested one suspect and are tracing other members of the network to recover the funds.

5. Aundh Doctor Defrauded of ₹2.09 Lakh by Fraudsters Posing as Bank Officials

An Aundh-based doctor fell victim to a scam after receiving calls from individuals claiming to be bank officials. Sharing sensitive account details led to a loss of ₹2.09 lakh. Cybercrime authorities have filed a case and issued warnings.


INTERNATIONAL UPDATES

6. Outtake Raises $40 Million to Expand AI-Driven Cyber Fraud Detection

AI cybersecurity firm Outtake secured $40 million in Series B funding to enhance its fraud detection platform, strengthen global operations, and combat sophisticated digital scams.

7. Ecobank Rwanda Cyber Fraud Convict Appeals Seven-Year Sentence

A man convicted of $620,000 cyber fraud involving Ecobank Rwanda has appealed his seven-year prison sentence. The appellate court is set to hear arguments in the coming weeks.

8. Police Bust ₦7.7 Billion Telecom Cyber Fraud Network; Six Arrested

Authorities uncovered a massive telecom-linked cybercrime network in Nigeria, responsible for ₦7.7 billion in illicit transactions. Six suspects have been arrested, and raids continue to identify additional accomplices.

9. Cybercrime Ring Dismantled in Tashkent, 200 Million Soums Seized

Law enforcement agencies in Tashkent dismantled a cybercrime syndicate, seizing over 200 million soums. The group had been involved in online fraud and illegal digital operations. Criminal proceedings are underway.

10. US Charges 87 in ATM Jackpotting Scheme Linked to Tren de Aragua Gang

US federal authorities charged 87 individuals for using malware in an ATM jackpotting scheme tied to the Tren de Aragua criminal network. The operation caused widespread financial losses across multiple states.

Continue Reading

Trending

Copyright © 2022 420 Reports Marijuana News & Information Website | Reefer News | Cannabis News