A Strong Defense Wins Championships—and Protects Your Data
In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...
Financial institutions have long relied on network‑based controls to keep criminals out of Internet Banking systems and other critical infrastructure. But those controls are becoming less effective as criminals increasingly hide behind residential proxy networks. These networks make fraudulent activity appear as if it’s coming from a normal household Internet connection, rather than an obviously suspicious source.
Many households are unknowingly enrolled in residential proxy networks. This can happen when people:
These products can intentionally include hidden proxy code because the developer profits from selling access to the user’s connection. In other cases, the developer is unaware because hackers may have injected the proxy code somewhere in the software or device supply chain. Once installed, this code allows the device to quietly accept and relay Internet traffic as if it originated from the home network.
Operators of residential proxy networks sell access to these “clean” home IP addresses. Their biggest customers? Criminals trying to evade fraud detection. To the security systems at your institution, the traffic appears to be coming from a normal residential user, not a fraudster on the other side of the world.
Residential proxy networks themselves aren’t illegal. Only the criminal behavior routed through them is. To legally dismantle one, an organization must:
Few organizations have the resources to pursue this work. Google is one that does, and recently disrupted a massive residential proxy network known as IPIDEA, which consisted of millions of compromised devices.[1]
To help fight the war against residential proxy networks, institutions can do a few things. First, awareness is a powerful defense. Help people understand that “free” software or cheap IoT devices may come with hidden costs—like unintentionally helping criminals.
You can also encourage customers and employees to check whether their home IP address is associated with proxy traffic by browsing to https://check.labs.greynoise.io/. The site will immediately indicate whether the current IP has been flagged.
Another thing institutions can do is to help legislate. There is growing recognition that the current takedown process is too slow and too complex. Sezaneh Seymour recently recommended that Congress create a specialized Article I court dedicated to domain takedowns.[2] Such a court would:
Encouraging your Representatives to support this kind of reform could help make it significantly easier to disrupt these proxy networks in the future.
Residential proxy networks are making fraud prevention more challenging and more complex for financial institutions. But through better education, stronger advocacy, and greater awareness, your institution can take meaningful steps to reduce risk and support industry‑wide efforts to combat this growing threat.
[1]https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network
[2] https://www.csis.org/analysis/civil-takedowns-missing-legal-framework-cyber-disruption
In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...
"If everything is important, then nothing is." ― Patrick Lencioni We’ve all seen this concept applied to time management and other decision-making...
We have referenced this concept in blog posts previously related to growing your Information Security Program and ensuring independence in your...