Proxyware Malware Research
Notes and research related to proxyware malware campaigns, including fake utility installers, suspicious distribution paths, App Store abuse, network indicators, and infrastructure overlaps.
Research Focus
-
Fake utility installers
Research into installers posing as legitimate tools or productivity utilities while delivering proxyware or related unwanted components.
-
GhostSocks-related findings
Tracking observations, indicators, and infrastructure overlaps associated with GhostSocks and proxyware-style monetization behavior.
-
Detection opportunities
Useful detection angles include installer metadata, command-line behavior, scheduled tasks, persistence, network endpoints, and shared infrastructure.
-
Related blog posts
Recent posts tagged with Proxyware, GhostSocks, or Microsoft Store malware are linked from the main homepage and blog feed.