Bad sushi: China-nexus phishers shift to residential proxies
今年早些时候,研究人员发现针对日本的钓鱼攻击转向使用住宅代理网络,取代了中国的电信网络,并探讨了应对策略。 2025-10-16 15:23:0 Author: securityboulevard.com(查看原文) 阅读量:14 收藏

Earlier this year, Spamhaus researchers observed a major shift in phishing targeting Japan. Starting in April, a China-nexus threat actor began using residential proxy networks to send phishing emails instead of subnets at China Telecom and China Unicom. This blog explores the campaign’s origins and countermeasures against residential proxy-enabled spam.

*** This is a Security Bloggers Network syndicated blog from The Spamhaus Project authored by Jonas Arnold. Read the original post at: https://www.spamhaus.org/resource-hub/compromised/bad-sushi-china-nexus-phishers-shift-to-residential-proxies


文章来源: https://securityboulevard.com/2025/10/bad-sushi-china-nexus-phishers-shift-to-residential-proxies/
如有侵权请联系:admin#unsafe.sh