Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

IPCola: A Tangled Mess

0
Medium
Published: Tue Dec 02 2025 (12/02/2025, 21:13:46 UTC)
Source: AlienVault OTX General

Description

IPCola is a proxy service leveraging millions of IP addresses sourced from IoT, desktop, and mobile devices. It is linked to Gaganode, a decentralized bandwidth monetization platform with botnet-like features and an SDK capable of remote code execution. The service is distributed via various applications, including Chinese TV boxes and free software, creating a complex proxy network involving InstaIP and NuoChen Technology. This infrastructure enables attackers to harness a large pool of unique IPs for proxying traffic, potentially masking malicious activities. Although no known exploits are currently active, the remote code execution capability poses significant risks. The threat is medium severity due to the potential for widespread abuse and the difficulty in detecting such proxy networks. European organizations could be impacted by abuse of these IPs for anonymizing attacks or evading detection. Mitigation requires enhanced network monitoring, blocking suspicious IP ranges, and scrutinizing applications that may embed the Gaganode SDK. Countries with high IoT adoption and significant use of Chinese-origin devices, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 12/03/2025, 11:16:51 UTC

Technical Analysis

IPCola is a newly identified proxy service that claims to operate millions of active IP addresses sourced from a diverse range of devices including IoT gadgets, desktops, and mobile phones. Investigations reveal that IPCola is connected to Gaganode, a decentralized bandwidth monetization service that exhibits characteristics similar to a botnet. Gaganode's software development kit (SDK) includes remote code execution (RCE) capabilities, which allow operators to execute arbitrary code on infected or enrolled devices remotely. This capability significantly elevates the security risk posed by the service. The distribution of Gaganode's SDK and IPCola's proxy service occurs through multiple channels, notably including Chinese TV boxes and free software applications, which are often installed on consumer devices without rigorous security vetting. IPCola is also linked to other proxy providers such as InstaIP and NuoChen Technology, indicating a complex and intertwined network of proxy services that aggregate and monetize bandwidth from compromised or willingly enrolled devices. This network allows attackers or malicious actors to utilize a vast pool of unique IP addresses to proxy traffic, thereby obscuring their true origin and complicating attribution efforts. The threat does not currently have known exploits in the wild but remains a medium severity concern due to the potential for abuse in anonymizing malicious activities, evading detection, or launching attacks through these proxy IPs. The presence of RCE in the SDK further increases the risk, as it could be leveraged to expand control over devices or deploy additional malicious payloads. The investigation highlights the intricate relationships between proxy providers and SDKs, emphasizing the challenges in tracking and mitigating such decentralized and distributed proxy infrastructures.

Potential Impact

For European organizations, the IPCola threat presents several risks. The use of millions of proxy IPs sourced from IoT and consumer devices can facilitate anonymized attacks against European networks, including credential stuffing, fraud, and distributed denial-of-service (DDoS) attacks, complicating attribution and response efforts. The remote code execution capability embedded in the Gaganode SDK raises the possibility of these proxy devices being commandeered for further malicious activities, such as lateral movement or deployment of ransomware within European corporate networks. Additionally, the widespread distribution of the SDK through consumer devices, particularly Chinese TV boxes and free software, increases the likelihood that European users and organizations may inadvertently host or route traffic through these proxy nodes. This can degrade network performance, increase exposure to malicious traffic, and complicate incident investigations. The medium severity rating reflects the balance between the current lack of known active exploits and the significant potential for misuse. The threat could also undermine trust in IoT and consumer devices prevalent in European homes and businesses, potentially leading to increased operational costs for monitoring and mitigation.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic advice. First, enhance network traffic analysis to detect and block traffic originating from or routed through known IPCola-related IP ranges and domains, leveraging the provided indicators such as hashes, domains, and URLs. Deploy advanced threat intelligence feeds that include IPCola and Gaganode indicators to update firewall and intrusion detection/prevention system (IDS/IPS) rules. Conduct thorough audits of IoT devices and consumer-grade hardware, especially those sourced from or related to Chinese manufacturers, to identify unauthorized SDKs or proxy software installations. Collaborate with endpoint security teams to detect unusual remote code execution attempts or unauthorized application behaviors linked to the Gaganode SDK. Educate users about the risks of installing free software or unverified applications that may embed malicious SDKs. Engage with device vendors and supply chain partners to ensure firmware and software integrity and to request removal or patching of vulnerable SDK components. Finally, implement network segmentation to isolate IoT and consumer devices from critical enterprise infrastructure, limiting the potential impact of compromised devices acting as proxy nodes.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://synthient.com/blog/ipcola-a-tangled-mess"]
Adversary
null
Pulse Id
692f568ace05763e9b6d44a7
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash11cf6598597fb2ebd8590e9ea70754e7
hash66ea2c2bcaf2745d8319af993e7213c2772ddbb1
hash0519a0936a350eaa79b64ea5cd667272a83b73fe9a3df9fb6f04ef42373dc8de
hash07eeff3570d0031946ac06670a4440816eb6f0683fc29519422bb838c38e4357
hash258b4a160ae535ae70954e555bbcf93acdbb9d7343f2ed70dca67d093d759daa
hash4628b7af20bd83417e3ddd31fd76e7ad8a1665b8366bd9cd76ecede8e111a90c
hash6ce63bced5efd85f97bb90ef7f8513e3d16c5c42867007dbdeb0ae9a05b5ce26
hash7fb9e1f2aaade75bbd463a94d6995218f79a915bcb85c8c9774b3008f5c4f916
hash8b35387ab989d7f965061cd1c81340ea371d90c2177c304a4a1c4d1236b35561
hash8f741f6945bd40627c72380a3c01b660eec15d974b978b64042e73bad2f44e5b
hash97d2d0dacafb9f92ac67492eb4a740e05bd5f8b13325a942fa127182bb6d9593
hash997feb8cf90ee51c50b9445a8632a4ec37aff419b28cd1c5a3291f066fb960c8
hashaeeeaff668e4ef34aa77a27a344a195aea4a02ba90815a67b2db380b8f128f59
hashc077a38215072901ec6ffc727de6986d705ac6391cb8b85c94abc9b57f957142
hashccb4d03a05595a529ba16f32ad11f10d2f976f3a7fb2b57e38a9d6aea829fd67
hashd213377507bc658737768cfccb94eb4c6340629f10a766064de2fee8753694c6
hashd95ac995812193f66a01541a57a1f6b962142ecdef704f147df1e3ac2e201b30
hashf9a18a48b2013a1c7592236474970dac2652b0509c45efaa7e4aec407579d0d6

Url

ValueDescriptionCopy
urlhttp://api.package.coreservice.io:10443
urlhttp://proxy.hideiqxshlgvjk.com:5050

Domain

ValueDescriptionCopy
domainapi.package.coreservice.io
domaingtxvdqvuweqs.com
domainfile.universe30.com
domainassets.coreservice.io

Threat ID: 69301885e1f6412a905ea5f8

Added to database: 12/3/2025, 11:01:25 AM

Last enriched: 12/3/2025, 11:16:51 AM

Last updated: 12/5/2025, 1:00:57 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats