TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Does Santa Like NordVPN? | Huntress

2024-12-16 · Read original ↗

ATT&CK techniques detected

8 predictions
T1090.003Multi-hop Proxy
84%
“’ re using them for shady activity, you better trust that all of their claims of privacy and anonymity by design are legitimate. if not, you might wake up to an fbi raid. why it ’ s on the naughty list : hma earns its place on the list because of its history of cooperating with l…”
T1090.003Multi-hop Proxy
77%
“in this web, encrypting and decrypting different levels along the way. the system is set up so that no two servers in the chain can ever know the destination, the source, and the contents of the traffic at the same time, thus ensuring anonymity and privacy. - upsides : it ’ s com…”
T1090.002External Proxy
51%
“go to such lengths in their day - to - day working life. tor can be invaluable for those who work in journalism, political environments, or in the shadow of autocratic governments. but there ’ s generally no reason why your average frozen yogurt shop owner should be logging into …”
T1090Proxy
45%
“identifiable information ( pii ). - and on the subject of payment … not only does mullvad allow for cryptocurrency payment, but it also encourages users to mail in cash along with their account number scribbled on a piece of paper to retain complete anonymity. - no free trial, bu…”
T1090.003Multi-hop Proxy
41%
“go to such lengths in their day - to - day working life. tor can be invaluable for those who work in journalism, political environments, or in the shadow of autocratic governments. but there ’ s generally no reason why your average frozen yogurt shop owner should be logging into …”
T1090.002External Proxy
40%
“is a web3 protocol proxy that uses blockchain technology to facilitate bandwidth trading. its decentralized network of servers redistributes idle bandwidth to clients in exchange for mining crypto coins. - basically, crypto bros across the globe run this program, adding their ser…”
T1090Proxy
36%
“does santa like nordvpn? | huntress well, kids, let ’ s just say santa ’ s workshop has a strict policy against being on the naughty list. in the world of cybersecurity, that list includes some popular — but perilous — virtual private networks ( vpns ) and proxies. vpns and proxi…”
T1133External Remote Services
33%
“— combined with its acceptance of over 70 cryptocurrencies — which provide cybercriminals with the perfect tools to obfuscate malicious activity and bypass detection. many identity providers will not scrutinize traffic that comes from a similar geolocation as the victim user, so …”

Summary

Huntress Managed ITDR uncovers risks behind popular VPNs and proxies like NordVPN, Mullvad, and more—helping you steer clear of hackers this holiday season.