New VoidProxy PhaaS Service Emerges, Offering Advanced Proxy Solutions for Cybercriminals

A new Proxy-as-a-Service (PhaaS) platform named VoidProxy has recently emerged in the cybercrime ecosystem, providing sophisticated proxy solutions that facilitate anonymous and secure internet access for malicious actors. VoidProxy offers a wide range of proxy types, including residential, mobile, and data center proxies, enabling cybercriminals to mask their identities and locations effectively. This service is designed to support various illicit activities such as credential stuffing, web scraping, and evading geo-restrictions, making it a valuable tool for threat actors seeking to enhance their operational security. VoidProxy distinguishes itself with a user-friendly interface, competitive pricing, and high-speed connections, attracting a growing number of cybercriminals. The platform's infrastructure is robust, leveraging a global network of compromised devices and legitimate proxy servers to ensure reliability and anonymity. Security researchers have noted that VoidProxy's capabilities pose significant challenges for defenders, as it complicates attribution and detection efforts. The rise of PhaaS platforms like VoidProxy underscores the evolving tactics of cybercriminals who continuously seek innovative methods to bypass security measures. Organizations are advised to strengthen their defenses by implementing advanced threat detection systems, monitoring for unusual proxy traffic, and educating employees about the risks associated with proxy abuse. Collaboration between cybersecurity firms and law enforcement agencies is crucial to dismantle such services and mitigate their impact on the digital ecosystem. In conclusion, VoidProxy represents a new frontier in proxy services tailored for malicious use, highlighting the need for heightened vigilance and proactive security strategies in the face of increasingly sophisticated cyber threats. Staying informed about emerging tools like VoidProxy is essential for cybersecurity professionals aiming to protect their networks and data from exploitation.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 15 Sep 2025 07:45:15 +0000


Cyber News related to New VoidProxy PhaaS Service Emerges, Offering Advanced Proxy Solutions for Cybercriminals

New VoidProxy PhaaS Service Emerges, Offering Advanced Proxy Solutions for Cybercriminals - A new Proxy-as-a-Service (PhaaS) platform named VoidProxy has recently emerged in the cybercrime ecosystem, providing sophisticated proxy solutions that facilitate anonymous and secure internet access for malicious actors. VoidProxy offers a wide ...
3 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
5 months ago Cybersecuritynews.com
Lucid PhAAS With 17,500 Phishing Domains Targets Multiple Sectors - Lucid Phishing-as-a-Service (PhAAS) has been identified as a significant threat in the cybersecurity landscape, leveraging an extensive network of over 17,500 phishing domains. This sophisticated operation targets multiple sectors, including finance, ...
3 months ago Cybersecuritynews.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
8 months ago Cybersecuritynews.com
New VoidProxy phishing service targets Microsoft 365, Google accounts - A new phishing service called VoidProxy has emerged, targeting Microsoft 365 and Google accounts with sophisticated tactics. This service operates by setting up phishing pages that mimic legitimate login portals to steal user credentials. VoidProxy ...
3 months ago Bleepingcomputer.com
VB.NET Proxy and VPN Check with IP2Location.io - Virtual Private Network servers are proxy servers that people use daily when browsing the Internet. As most of us are aware, websites track their visitors for advertising and marketing purposes. That's the same reason that people use residential ...
2 years ago Feeds.dzone.com
Windows KDC Proxy RCE Vulnerability Let Attackers Control The Server Remotely - Security researchers have uncovered a significant remote code execution vulnerability in Microsoft’s Windows Key Distribution Center (KDC) Proxy that could potentially allow attackers to gain complete control over affected servers. The ...
9 months ago Cybersecuritynews.com CVE-2024-43639
CVE-2024-37891 - urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* ...
1 year ago
Quantum-Route Redirect PhaaS Targets Microsoft 365 Users Worldwide - A new phishing-as-a-service (PhaaS) campaign named Quantum-Route Redirect has been discovered targeting Microsoft 365 users globally. This sophisticated phishing operation leverages redirect techniques to deceive users into divulging their ...
1 month ago Bleepingcomputer.com
15 PostgreSQL Monitoring Tools - 2025 - What is Good?What Could Be Better?Monitoring application performance, user experience, and errors.Some users find the pricing high, especially for larger environments.Continuous server, database, and infrastructure monitoring.The extensive feature ...
7 months ago Cybersecuritynews.com
How to secure on-prem apps with Entra Application Proxy - If your internal web applications are still internet-facing, then it's time to move away from turning your firewall into Swiss cheese just to externalize apps for your users. To reduce the attack surface, a traditional method, such as a VPN, has its ...
1 year ago Techtarget.com
Best Network Security Companies for CISOs - 2025 - This guide has spotlighted the top 10 network security companies—each excelling in specific domains such as zero trust, endpoint protection, AI-driven analytics, and cloud-native security. Zscaler offers a cloud-native security platform that ...
5 months ago Cybersecuritynews.com
Socks5Systemz proxy service infects 10,000 systems worldwide - A proxy botnet called 'Socks5Systemz' has been infecting computers worldwide via the 'PrivateLoader' and 'Amadey' malware loaders, currently counting 10,000 infected devices. The malware infects computers and turns them into traffic-forwarding ...
2 years ago Bleepingcomputer.com
Best MDR (Managed Detection & Response) Solutions - 2025 - Cybereason Managed Detection and Response solutions provide 24/7 threat monitoring, advanced endpoint protection, and rapid incident response. Cynet MDR solutions provide automated threat detection and response, ensuring comprehensive security ...
8 months ago Cybersecuritynews.com
Pirated Software Puts Mac Users at Risk as Proxy Malware Emerges - Malware is being targeted at Mac users who receive pirated versions of popular apps from warez websites after they choose to download them from those websites. Various reports state that cybercriminals are infecting macOS devices with proxy trojans ...
2 years ago Cysecurity.news
Resecurity and ICS Technologies join forces to improve cybersecurity in Iraq - Resecurity and ICS Technologies IRAQ, a well-established ICT System Integration Company with HQ in Baghdad, Iraq, have joined forces to fortify cybersecurity, fraud prevention and risk intelligence measures nationwide. This strategic partnership is ...
2 years ago Helpnetsecurity.com
FBI shares massive list of 42,000 LabHost phishing domains - The FBI has shared 42,000 phishing domains tied to the LabHost cybercrime platform, one of the largest global phishing-as-a-service (PhaaS) platforms that was dismantled in April 2024. The list can also be used by security teams to retrospectively ...
7 months ago Bleepingcomputer.com
From Trend to Mainstay: The Unstoppable Force of Managed Services - There's no denying that IT managed services are being embraced across businesses of all sizes as a path to achieve business goals. As technologies becomes increasingly complex and the lines between siloed architectures become blurred, companies are ...
1 year ago Feedpress.me
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Ransomware Attack Prevention Checklist - 2025 - Sophos: Sophos provides a range of security solutions, including Intercept X, which offers advanced endpoint protection with anti-ransomware features, exploit prevention, and deep learning technology to detect and stop ransomware attacks. Trend ...
8 months ago Cybersecuritynews.com
Green Technology Innovations: Sustainable Solutions - Unveil the reality behind green technology innovations by exploring the realm of sustainable solutions. Green technology presents a wide array of sustainable innovations, such as solar panels and wind turbines, offering eco-friendly solutions to our ...
1 year ago Securityzap.com
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
1 year ago Cybersecuritynews.com
42,000 Phishing Domains Linked to the LabHost PhaaS Service - “The platform enabled cyber criminals to impersonate more than 200 organizations, including major banks and government institutions, in an effort to collect personal information and banking credentials from unsuspecting victims ...
7 months ago Cybersecuritynews.com
Calling Home, Get Your Callbacks Through RBI - Following a brief introduction to the technology, we share our firsthand experiences when encountering RBI solutions and techniques the SpecterOps team have employed for establishing command and control to systems that proxy traffic through RBI ...
1 year ago Securityboulevard.com