<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Proxy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/proxy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/proxy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mirax RAT Targeting Android Users in Europe</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</guid><description>Mirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.</description><content:encoded><![CDATA[<p>The Mirax RAT is a newly identified Android Remote Access Trojan (RAT) that has been actively targeting users in Europe since March 2026. It&rsquo;s offered as Malware-as-a-Service (MaaS) to a small group of affiliates, primarily Russian-speaking actors, through tiered subscription models. Since December 2025, Mirax has been promoted on underground forums and used in multiple campaigns. The RAT&rsquo;s distribution relies on malicious advertisements on Meta platforms like Facebook, Instagram, and Messenger, with over 200,000 users potentially exposed to these ads. The malware uses dropper pages hosted on GitHub and relies on APK sideloading for execution, bypassing the Google Play Store&rsquo;s security measures. Mirax&rsquo;s capabilities extend beyond typical RAT functions, including turning infected devices into residential proxy nodes via a SOCKS5 proxy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates malicious ads on Facebook, Instagram, and Messenger promoting IPTV application services.</li>
<li>Users click on the advertisements, which redirect them to dropper pages hosted on GitHub.</li>
<li>The user is prompted to enable installation from unknown sources on their Android device.</li>
<li>The malicious IPTV application is installed via APK sideloading.</li>
<li>The application initiates a multi-stage infection process, utilizing Golden Encryption (Golden Crypt) to pack the payload.</li>
<li>The payload, an encrypted Dalvik Executable (.dex) file, is decrypted during installation using the RC4 stream cipher with a hardcoded key.</li>
<li>Mirax gains control of the device, enabling overlay and notification injection for credential theft.</li>
<li>Attackers can view the screen in real-time, navigate and control the device, manage applications, exfiltrate images and text, and launch a SOCKS5 proxy connection to proxy traffic through the infected device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mirax RAT campaign has the potential to affect a large number of Android users in Europe. The malicious advertisements have already reached over 200,000 users. Successful infections can lead to credential theft, financial fraud, data exfiltration, and the compromised device being used as a residential proxy, potentially masking malicious activity and further expanding the attacker&rsquo;s reach. Banks and financial institutions are specifically highlighted as high-value targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to GitHub domains associated with APK downloads, and correlate that with android device user agents (Network Connection and User Agent logs).</li>
<li>Implement detections for process creation events related to sideloaded APK installations, specifically looking for unusual parent-child process relationships (Process Creation Logs).</li>
<li>Deploy the Sigma rule provided below to detect the execution of applications from untrusted sources and tune for your environment.</li>
<li>Monitor network connections for SOCKS5 proxy traffic originating from Android devices, which may indicate compromised devices acting as residential proxies (Network Connection Logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>android</category><category>rat</category><category>mirax</category><category>malware-as-a-service</category><category>proxy</category></item><item><title>Potential Protocol Tunneling via Yuze</title><link>https://feed.craftedsignal.io/briefs/2024-01-yuze-tunneling/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-yuze-tunneling/</guid><description>This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.</description><content:encoded><![CDATA[<p>This rule detects the execution of Yuze, an open-source tunneling tool written in C, which is commonly used for intranet penetration. Yuze supports both forward and reverse SOCKS5 proxy tunneling and is often executed using <code>rundll32</code> to load <code>yuze.dll</code> with the <code>RunYuze</code> export. Threat actors can leverage Yuze to proxy command and control (C2) communications or to pivot within a network. The detection focuses on identifying processes with command-line arguments indicative of Yuze execution, specifically those involving &ldquo;reverse,&rdquo; &ldquo;-c,&rdquo; &ldquo;proxy,&rdquo; &ldquo;fwd,&rdquo; and &ldquo;-l&rdquo; parameters. This activity has been observed in real-world campaigns, increasing the importance of timely detection and response.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a target system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker uploads or drops the <code>yuze.dll</code> file onto the compromised host.</li>
<li>The attacker uses <code>rundll32.exe</code> to execute <code>yuze.dll</code>, calling the <code>RunYuze</code> export.</li>
<li>The command line includes parameters to establish a reverse or forward SOCKS5 proxy tunnel (e.g., <code>rundll32 yuze.dll,RunYuze reverse -c &lt;ip&gt;:&lt;port&gt;</code>).</li>
<li>Yuze establishes a tunnel to a remote server, allowing the attacker to proxy network traffic.</li>
<li>The attacker uses the established tunnel to pivot within the network and access internal resources.</li>
<li>The attacker may proxy C2 traffic through the tunnel, masking the true origin of the commands.</li>
<li>The attacker performs actions on the internal network, such as data exfiltration or lateral movement, using the tunnel as a covert channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish covert communication channels, bypass network security controls, and proxy malicious traffic, potentially leading to unauthorized access to sensitive data, lateral movement within the network, and data exfiltration. The use of Yuze can obscure the origin of attacks, making attribution more difficult and hindering incident response efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Yuze Tunneling via Rundll32&rdquo; to your SIEM to detect the execution of <code>yuze.dll</code> via <code>rundll32.exe</code> with specific command-line arguments.</li>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Auditing) to capture the necessary command-line information for the Sigma rules.</li>
<li>Investigate any identified instances of <code>rundll32.exe</code> executing <code>yuze.dll</code>, focusing on the parent processes and network connections.</li>
<li>Block the C2/relay IP or domain found in the <code>-c</code> argument at DNS/firewall, as described in the Triage and Analysis section of the rule&rsquo;s note.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>tunneling</category><category>yuze</category><category>proxy</category></item><item><title>Okta User Session Start via Anonymizing Proxy Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-anonymizing-proxy/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-anonymizing-proxy/</guid><description>Detection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting Okta user session starts that originate from anonymizing proxy services. Anonymizing proxies can be used by malicious actors to mask their true IP addresses and location, making it more difficult to trace their activities. The use of such proxies during Okta authentication is suspicious because it bypasses geographical restrictions and may indicate compromised credentials. Defenders should be aware that legitimate users may occasionally use anonymizing proxies for privacy reasons, but the activity warrants close scrutiny. The detection of this activity relies on Okta system logs and the security context of the authentication event.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains valid Okta credentials through phishing, credential stuffing, or other means.</li>
<li>Attacker configures their network connection to route traffic through an anonymizing proxy service (e.g., Tor, VPN).</li>
<li>Attacker initiates an Okta user session using the compromised credentials.</li>
<li>Okta system logs record a &ldquo;user.session.start&rdquo; event.</li>
<li>The &ldquo;securityContext.isProxy&rdquo; field within the Okta event is set to &ldquo;true&rdquo;, indicating the use of a proxy service.</li>
<li>If successful, the attacker gains access to the Okta account and any associated applications or resources.</li>
<li>Attacker may then attempt to escalate privileges, access sensitive data, or perform other malicious activities within the Okta environment.</li>
<li>The attacker may attempt lateral movement to other systems within the organization that trust Okta for authentication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive applications and data protected by Okta. This could result in data breaches, financial loss, or reputational damage. Depending on the compromised user&rsquo;s privileges, an attacker may be able to escalate privileges and gain control over critical systems. The number of potential victims depends on the scope of applications using Okta for authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta user sessions initiated through anonymizing proxies (logsource: okta, service: okta).</li>
<li>Investigate all alerts generated by the Sigma rule to determine the legitimacy of the proxy usage.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of account compromise.</li>
<li>Monitor Okta system logs for other suspicious activities, such as failed login attempts or unusual access patterns (references: Okta System Log API).</li>
<li>Review and enforce Okta&rsquo;s cross-tenant impersonation prevention and detection measures (references: Okta cross-tenant impersonation article).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>proxy</category><category>defense-evasion</category></item></channel></rss>