IPCola: A Tangled Mess
IPCola is a proxy service leveraging millions of IP addresses sourced from IoT, desktop, and mobile devices. It is linked to Gaganode, a decentralized bandwidth monetization platform with botnet-like features and an SDK capable of remote code execution. The service is distributed via various applications, including Chinese TV boxes and free software, creating a complex proxy network involving InstaIP and NuoChen Technology. This infrastructure enables attackers to harness a large pool of unique IPs for proxying traffic, potentially masking malicious activities. Although no known exploits are currently active, the remote code execution capability poses significant risks. The threat is medium severity due to the potential for widespread abuse and the difficulty in detecting such proxy networks. European organizations could be impacted by abuse of these IPs for anonymizing attacks or evading detection. Mitigation requires enhanced network monitoring, blocking suspicious IP ranges, and scrutinizing applications that may embed the Gaganode SDK. Countries with high IoT adoption and significant use of Chinese-origin devices, such as Germany, France, and the UK, are more likely to be affected.
AI Analysis
Technical Summary
IPCola is a newly identified proxy service that claims to operate millions of active IP addresses sourced from a diverse range of devices including IoT gadgets, desktops, and mobile phones. Investigations reveal that IPCola is connected to Gaganode, a decentralized bandwidth monetization service that exhibits characteristics similar to a botnet. Gaganode's software development kit (SDK) includes remote code execution (RCE) capabilities, which allow operators to execute arbitrary code on infected or enrolled devices remotely. This capability significantly elevates the security risk posed by the service. The distribution of Gaganode's SDK and IPCola's proxy service occurs through multiple channels, notably including Chinese TV boxes and free software applications, which are often installed on consumer devices without rigorous security vetting. IPCola is also linked to other proxy providers such as InstaIP and NuoChen Technology, indicating a complex and intertwined network of proxy services that aggregate and monetize bandwidth from compromised or willingly enrolled devices. This network allows attackers or malicious actors to utilize a vast pool of unique IP addresses to proxy traffic, thereby obscuring their true origin and complicating attribution efforts. The threat does not currently have known exploits in the wild but remains a medium severity concern due to the potential for abuse in anonymizing malicious activities, evading detection, or launching attacks through these proxy IPs. The presence of RCE in the SDK further increases the risk, as it could be leveraged to expand control over devices or deploy additional malicious payloads. The investigation highlights the intricate relationships between proxy providers and SDKs, emphasizing the challenges in tracking and mitigating such decentralized and distributed proxy infrastructures.
Potential Impact
For European organizations, the IPCola threat presents several risks. The use of millions of proxy IPs sourced from IoT and consumer devices can facilitate anonymized attacks against European networks, including credential stuffing, fraud, and distributed denial-of-service (DDoS) attacks, complicating attribution and response efforts. The remote code execution capability embedded in the Gaganode SDK raises the possibility of these proxy devices being commandeered for further malicious activities, such as lateral movement or deployment of ransomware within European corporate networks. Additionally, the widespread distribution of the SDK through consumer devices, particularly Chinese TV boxes and free software, increases the likelihood that European users and organizations may inadvertently host or route traffic through these proxy nodes. This can degrade network performance, increase exposure to malicious traffic, and complicate incident investigations. The medium severity rating reflects the balance between the current lack of known active exploits and the significant potential for misuse. The threat could also undermine trust in IoT and consumer devices prevalent in European homes and businesses, potentially leading to increased operational costs for monitoring and mitigation.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic advice. First, enhance network traffic analysis to detect and block traffic originating from or routed through known IPCola-related IP ranges and domains, leveraging the provided indicators such as hashes, domains, and URLs. Deploy advanced threat intelligence feeds that include IPCola and Gaganode indicators to update firewall and intrusion detection/prevention system (IDS/IPS) rules. Conduct thorough audits of IoT devices and consumer-grade hardware, especially those sourced from or related to Chinese manufacturers, to identify unauthorized SDKs or proxy software installations. Collaborate with endpoint security teams to detect unusual remote code execution attempts or unauthorized application behaviors linked to the Gaganode SDK. Educate users about the risks of installing free software or unverified applications that may embed malicious SDKs. Engage with device vendors and supply chain partners to ensure firmware and software integrity and to request removal or patching of vulnerable SDK components. Finally, implement network segmentation to isolate IoT and consumer devices from critical enterprise infrastructure, limiting the potential impact of compromised devices acting as proxy nodes.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
Indicators of Compromise
- hash: 11cf6598597fb2ebd8590e9ea70754e7
- hash: 66ea2c2bcaf2745d8319af993e7213c2772ddbb1
- hash: 0519a0936a350eaa79b64ea5cd667272a83b73fe9a3df9fb6f04ef42373dc8de
- hash: 07eeff3570d0031946ac06670a4440816eb6f0683fc29519422bb838c38e4357
- hash: 258b4a160ae535ae70954e555bbcf93acdbb9d7343f2ed70dca67d093d759daa
- hash: 4628b7af20bd83417e3ddd31fd76e7ad8a1665b8366bd9cd76ecede8e111a90c
- hash: 6ce63bced5efd85f97bb90ef7f8513e3d16c5c42867007dbdeb0ae9a05b5ce26
- hash: 7fb9e1f2aaade75bbd463a94d6995218f79a915bcb85c8c9774b3008f5c4f916
- hash: 8b35387ab989d7f965061cd1c81340ea371d90c2177c304a4a1c4d1236b35561
- hash: 8f741f6945bd40627c72380a3c01b660eec15d974b978b64042e73bad2f44e5b
- hash: 97d2d0dacafb9f92ac67492eb4a740e05bd5f8b13325a942fa127182bb6d9593
- hash: 997feb8cf90ee51c50b9445a8632a4ec37aff419b28cd1c5a3291f066fb960c8
- hash: aeeeaff668e4ef34aa77a27a344a195aea4a02ba90815a67b2db380b8f128f59
- hash: c077a38215072901ec6ffc727de6986d705ac6391cb8b85c94abc9b57f957142
- hash: ccb4d03a05595a529ba16f32ad11f10d2f976f3a7fb2b57e38a9d6aea829fd67
- hash: d213377507bc658737768cfccb94eb4c6340629f10a766064de2fee8753694c6
- hash: d95ac995812193f66a01541a57a1f6b962142ecdef704f147df1e3ac2e201b30
- hash: f9a18a48b2013a1c7592236474970dac2652b0509c45efaa7e4aec407579d0d6
- url: http://api.package.coreservice.io:10443
- url: http://proxy.hideiqxshlgvjk.com:5050
- domain: api.package.coreservice.io
- domain: gtxvdqvuweqs.com
- domain: file.universe30.com
- domain: assets.coreservice.io
IPCola: A Tangled Mess
Description
IPCola is a proxy service leveraging millions of IP addresses sourced from IoT, desktop, and mobile devices. It is linked to Gaganode, a decentralized bandwidth monetization platform with botnet-like features and an SDK capable of remote code execution. The service is distributed via various applications, including Chinese TV boxes and free software, creating a complex proxy network involving InstaIP and NuoChen Technology. This infrastructure enables attackers to harness a large pool of unique IPs for proxying traffic, potentially masking malicious activities. Although no known exploits are currently active, the remote code execution capability poses significant risks. The threat is medium severity due to the potential for widespread abuse and the difficulty in detecting such proxy networks. European organizations could be impacted by abuse of these IPs for anonymizing attacks or evading detection. Mitigation requires enhanced network monitoring, blocking suspicious IP ranges, and scrutinizing applications that may embed the Gaganode SDK. Countries with high IoT adoption and significant use of Chinese-origin devices, such as Germany, France, and the UK, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
IPCola is a newly identified proxy service that claims to operate millions of active IP addresses sourced from a diverse range of devices including IoT gadgets, desktops, and mobile phones. Investigations reveal that IPCola is connected to Gaganode, a decentralized bandwidth monetization service that exhibits characteristics similar to a botnet. Gaganode's software development kit (SDK) includes remote code execution (RCE) capabilities, which allow operators to execute arbitrary code on infected or enrolled devices remotely. This capability significantly elevates the security risk posed by the service. The distribution of Gaganode's SDK and IPCola's proxy service occurs through multiple channels, notably including Chinese TV boxes and free software applications, which are often installed on consumer devices without rigorous security vetting. IPCola is also linked to other proxy providers such as InstaIP and NuoChen Technology, indicating a complex and intertwined network of proxy services that aggregate and monetize bandwidth from compromised or willingly enrolled devices. This network allows attackers or malicious actors to utilize a vast pool of unique IP addresses to proxy traffic, thereby obscuring their true origin and complicating attribution efforts. The threat does not currently have known exploits in the wild but remains a medium severity concern due to the potential for abuse in anonymizing malicious activities, evading detection, or launching attacks through these proxy IPs. The presence of RCE in the SDK further increases the risk, as it could be leveraged to expand control over devices or deploy additional malicious payloads. The investigation highlights the intricate relationships between proxy providers and SDKs, emphasizing the challenges in tracking and mitigating such decentralized and distributed proxy infrastructures.
Potential Impact
For European organizations, the IPCola threat presents several risks. The use of millions of proxy IPs sourced from IoT and consumer devices can facilitate anonymized attacks against European networks, including credential stuffing, fraud, and distributed denial-of-service (DDoS) attacks, complicating attribution and response efforts. The remote code execution capability embedded in the Gaganode SDK raises the possibility of these proxy devices being commandeered for further malicious activities, such as lateral movement or deployment of ransomware within European corporate networks. Additionally, the widespread distribution of the SDK through consumer devices, particularly Chinese TV boxes and free software, increases the likelihood that European users and organizations may inadvertently host or route traffic through these proxy nodes. This can degrade network performance, increase exposure to malicious traffic, and complicate incident investigations. The medium severity rating reflects the balance between the current lack of known active exploits and the significant potential for misuse. The threat could also undermine trust in IoT and consumer devices prevalent in European homes and businesses, potentially leading to increased operational costs for monitoring and mitigation.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic advice. First, enhance network traffic analysis to detect and block traffic originating from or routed through known IPCola-related IP ranges and domains, leveraging the provided indicators such as hashes, domains, and URLs. Deploy advanced threat intelligence feeds that include IPCola and Gaganode indicators to update firewall and intrusion detection/prevention system (IDS/IPS) rules. Conduct thorough audits of IoT devices and consumer-grade hardware, especially those sourced from or related to Chinese manufacturers, to identify unauthorized SDKs or proxy software installations. Collaborate with endpoint security teams to detect unusual remote code execution attempts or unauthorized application behaviors linked to the Gaganode SDK. Educate users about the risks of installing free software or unverified applications that may embed malicious SDKs. Engage with device vendors and supply chain partners to ensure firmware and software integrity and to request removal or patching of vulnerable SDK components. Finally, implement network segmentation to isolate IoT and consumer devices from critical enterprise infrastructure, limiting the potential impact of compromised devices acting as proxy nodes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://synthient.com/blog/ipcola-a-tangled-mess"]
- Adversary
- null
- Pulse Id
- 692f568ace05763e9b6d44a7
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash11cf6598597fb2ebd8590e9ea70754e7 | — | |
hash66ea2c2bcaf2745d8319af993e7213c2772ddbb1 | — | |
hash0519a0936a350eaa79b64ea5cd667272a83b73fe9a3df9fb6f04ef42373dc8de | — | |
hash07eeff3570d0031946ac06670a4440816eb6f0683fc29519422bb838c38e4357 | — | |
hash258b4a160ae535ae70954e555bbcf93acdbb9d7343f2ed70dca67d093d759daa | — | |
hash4628b7af20bd83417e3ddd31fd76e7ad8a1665b8366bd9cd76ecede8e111a90c | — | |
hash6ce63bced5efd85f97bb90ef7f8513e3d16c5c42867007dbdeb0ae9a05b5ce26 | — | |
hash7fb9e1f2aaade75bbd463a94d6995218f79a915bcb85c8c9774b3008f5c4f916 | — | |
hash8b35387ab989d7f965061cd1c81340ea371d90c2177c304a4a1c4d1236b35561 | — | |
hash8f741f6945bd40627c72380a3c01b660eec15d974b978b64042e73bad2f44e5b | — | |
hash97d2d0dacafb9f92ac67492eb4a740e05bd5f8b13325a942fa127182bb6d9593 | — | |
hash997feb8cf90ee51c50b9445a8632a4ec37aff419b28cd1c5a3291f066fb960c8 | — | |
hashaeeeaff668e4ef34aa77a27a344a195aea4a02ba90815a67b2db380b8f128f59 | — | |
hashc077a38215072901ec6ffc727de6986d705ac6391cb8b85c94abc9b57f957142 | — | |
hashccb4d03a05595a529ba16f32ad11f10d2f976f3a7fb2b57e38a9d6aea829fd67 | — | |
hashd213377507bc658737768cfccb94eb4c6340629f10a766064de2fee8753694c6 | — | |
hashd95ac995812193f66a01541a57a1f6b962142ecdef704f147df1e3ac2e201b30 | — | |
hashf9a18a48b2013a1c7592236474970dac2652b0509c45efaa7e4aec407579d0d6 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://api.package.coreservice.io:10443 | — | |
urlhttp://proxy.hideiqxshlgvjk.com:5050 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainapi.package.coreservice.io | — | |
domaingtxvdqvuweqs.com | — | |
domainfile.universe30.com | — | |
domainassets.coreservice.io | — |
Threat ID: 69301885e1f6412a905ea5f8
Added to database: 12/3/2025, 11:01:25 AM
Last enriched: 12/3/2025, 11:16:51 AM
Last updated: 12/5/2025, 1:00:57 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-04
MediumQilin Ransomware Claims Data Theft from Church of Scientology
MediumSilver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
MediumNew Android malware lets criminals control your phone and drain your bank account
MediumNewly Sold Albiriox Android Malware Targets Banks and Crypto Holders
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.