Antoine Vastel@xopek59Ever wondered how bots get all these residential proxies to conduct credential stuffing attacks/DDoS? Interesting article that briefly explain how cyber criminals infect pools of device to monetize them as proxies:zdnet.comCyberattackers are now quietly selling off their victim's internet bandwidthProxyware is yet another way for criminals to generate revenue from their victims.7:16 AM · Sep 2, 2021·Twitter Web App1 Retweet1 Quote Tweet2 Likes