HomeCyber SecuritySystemBC Powers REM Proxy With 1,500 Every day VPS Victims Throughout 80...

SystemBC Powers REM Proxy With 1,500 Every day VPS Victims Throughout 80 C2 Servers


Sep 19, 2025Ravie LakshmananBotnet / Community Safety

SystemBC Powers REM Proxy With 1,500 Every day VPS Victims Throughout 80 C2 Servers

A proxy community generally known as REM Proxy is powered by malware generally known as SystemBC, providing about 80% of the botnet to its customers, in response to new findings from the Black Lotus Labs group at Lumen Applied sciences.

“REM Proxy is a sizeable community, which additionally markets a pool of 20,000 Mikrotik routers and a wide range of open proxies it finds freely obtainable on-line,” the corporate mentioned in a report shared with The Hacker Information. “This service has been a favourite for a number of actors reminiscent of these behind TransferLoader, which has ties to the Morpheus ransomware group.”

SystemBC is a C-based malware that turns contaminated computer systems into SOCKS5 proxies, permitting contaminated hosts to speak with a command-and-control (C2) server and obtain further payloads. First documented by Proofpoint in 2019, it is able to focusing on each Home windows and Linux methods.

In a report earlier this January, ANY.RUN revealed that the Linux variant of SystemBC proxy implant is probably designed for inside company companies, and that it is primarily used to focus on company networks, cloud servers, and IoT gadgets.

DFIR Retainer Services

As is usually the case with any proxy answer, customers of the community attain out to SystemBC C2s on high-numbered ports, which then route the consumer by way of to one of many victims earlier than reaching their vacation spot.

In keeping with Lumen, the SystemBC botnet includes over 80 C2 servers and a every day common of 1,500 victims, of which practically 80% are compromised digital personal server (VPS) methods from a number of giant industrial suppliers. Apparently, 300 of these victims are a part of one other botnet referred to as GoBruteforcer (aka GoBrut).

Of those, near 40% of the compromises have “extraordinarily lengthy common” an infection lifespans, lasting over 31 days. To make issues worse, the overwhelming majority of the victimized servers have been discovered to be vulnerable to a number of identified safety flaws. Every sufferer has 20 unpatched CVEs and not less than one important CVE on common, with one of many recognized VPS servers within the U.S. metropolis of Atlanta susceptible to greater than 160 unpatched CVEs.

“The victims are made into proxies that allow excessive volumes of malicious visitors to be used by a bunch of felony menace teams,” the corporate famous. “By manipulating VPS methods as an alternative of gadgets in residential IP house, as is typical in malware-based proxy networks, SystemBC can supply proxies with huge quantities of quantity for longer intervals of time.”

In addition to REM Proxy, a number of the different clients of the SystemBC embrace not less than two completely different Russia-based proxy companies, one Vietnamese proxy service referred to as VN5Socks (aka Shopsocks5), and a Russian internet scraping service.

Essential to the functioning of the malware is the IP deal with 104.250.164[.]214, which not solely hosts the artifacts but additionally seems to be the supply of assaults to recruit potential victims. As soon as new victims are ensnared, a shell script is dropped on the machine to subsequently ship the malware.

The botnet operates with little regard for stealth, with the first objective being to increase in quantity to enlist as many gadgets as attainable into the botnet. One of many largest use circumstances of the illicit community is by the menace actors behind SystemBC themselves, who use it to brute-force WordPress website credentials.

CIS Build Kits

The top objective is more likely to promote the harvested credentials to different felony actors in underground boards, who then weaponize them to inject malicious code into the websites in query for follow-on campaigns.

“SystemBC has exhibited sustained exercise and operational resilience throughout a number of years, establishing itself as a persistent vector inside the cyber menace panorama,” Lumen mentioned. “Initially utilized by menace actors to allow ransomware campaigns, the platform has developed to supply the meeting and sale of bespoke botnets.”

“Their mannequin gives appreciable benefits: it permits the execution of widespread reconnaissance, spam dissemination, and associated actions, permitting an attacker to order extra selective proxy assets for focused assaults knowledgeable by prior intelligence gathering.”

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments