Dragging Out Dragons: Slaying Hidden Threats in Residential and Mobile IP Proxies
This talk explores the use of residential and mobile IP proxies by malicious actors to conduct automated attacks, such as account takeovers and web scraping, while evading detection. It details how these proxies leverage legitimate user IP addresses to bypass rate limiting and security controls, making them difficult to distinguish from authentic traffic. The presentation provides practical guidance for defenders on detecting proxy-based traffic using techniques like header analysis, geolocation mismatch, and machine learning models. It also highlights the role of anti-bot vendors and CAPTCHA alternatives like Cloudflare Turnstile in mitigating these threats.
How Residential and Mobile Proxies Are Killing Your Rate Limiting
TLDR: Malicious actors are increasingly using residential and mobile IP proxies to bypass traditional rate limiting and bot detection systems. By routing traffic through legitimate residential gateways and mobile devices, attackers gain high-reputation IP addresses that are indistinguishable from real users. Pentesters and defenders must move beyond simple IP-based blocking and adopt behavioral analysis, TLS fingerprinting, and advanced bot management solutions to mitigate these threats.
Rate limiting based on IP address is dead. For years, we relied on blocking suspicious IPs or throttling requests from high-volume sources to stop automated scraping, credential stuffing, and account takeovers. That strategy assumes that a malicious actor is operating from a data center or a known VPN exit node. Today, that assumption is a liability. Attackers are now routing their traffic through residential and mobile proxy networks, effectively "borrowing" the reputation of legitimate home internet connections and mobile devices to blend in with your actual user base.
The Mechanics of Proxy-Based Evasion
Residential proxies work by routing traffic through residential gateways. When an attacker uses these services, their requests appear to originate from a home ISP, such as Comcast or AT&T, rather than a cloud provider like AWS or GCP. Mobile proxies take this a step further. Because mobile IP addresses are shared among thousands of users and rotate frequently as devices move between cell towers, they are almost impossible to block without causing significant collateral damage to legitimate mobile users.
The technical advantage for the attacker is clear. Most security controls, including OWASP's guidance on automated threats, emphasize the importance of identifying and mitigating automated traffic. However, when an attacker uses a proxy, the request headers and the IP reputation look pristine. The attacker is essentially using a Trojan horse. They are not just hiding their origin; they are masquerading as a trusted entity.
Why Your Current Defenses Are Failing
Many security teams rely on simple IP-based rate limiting to protect their endpoints. If you see 500 requests per second from a single IP, you drop the connection. But what happens when those 500 requests are distributed across 500 different residential IP addresses? Your rate limiter sees 500 unique users, each making one request per second. The attack succeeds because your defensive logic is tied to an identifier that the attacker has successfully commoditized.
The rise of "proxy jacking" has made this even more dangerous. Attackers compromise legitimate servers or devices, install proxy software, and resell that bandwidth to other malicious actors. This creates a massive, distributed botnet that is constantly rotating. During a recent engagement, I observed an attacker using a combination of MultiLogin and a residential proxy provider to cycle through thousands of unique browser fingerprints. Each session appeared to be a new, unique user from a different city, completely bypassing the session-based tracking we had in place.
Moving Beyond IP-Based Detection
If you are a pentester, your next engagement should include testing how the application handles distributed, low-and-slow attacks. Do not just test for SQL injection or XSS; test the application's resilience against automated abuse. If you can rotate your IP address for every request using a service like ProxyCheap or IPRoyal, you can likely bypass the application's primary defense layer.
For defenders, the shift must be toward behavioral analysis. You need to look at the "how" rather than the "where."
- TLS Fingerprinting: Analyze the JA3 or JA3S fingerprints of incoming connections. Even if the IP address is legitimate, the way a headless browser or a custom script initiates a TLS handshake often differs from a standard Chrome or Safari browser.
- Header Analysis: Look for inconsistencies. If a request claims to be from a mobile device but the HTTP headers suggest a desktop browser, or if the geolocation of the IP address does not match the language settings in the browser, you have a high-confidence signal of a proxy.
- WebRTC and DNS Leaks: Use tools like BrowserLeaks to understand how your application can challenge the client. If the client's reported IP address via WebRTC differs from the IP address seen by your server, the client is behind a proxy.
The Role of Advanced Bot Management
The most effective way to handle this is to stop trying to build a custom solution from scratch. The market has shifted toward advanced bot management platforms that use machine learning to analyze thousands of signals simultaneously. These platforms, such as those discussed in recent research on machine learning for bot detection, look at mouse movements, keyboard patterns, and session history to determine if a user is human.
If you cannot afford a full-scale bot management suite, consider implementing a CAPTCHA alternative like Cloudflare Turnstile. Unlike traditional CAPTCHAs that rely on human interaction, Turnstile uses non-interactive challenges to verify the client. It is a significant step up from standard rate limiting because it forces the client to prove its legitimacy without relying on the IP address as the sole source of truth.
Stop relying on the assumption that a residential IP is a safe IP. The next time you are auditing an application, ask yourself how easily you could automate the entire process using a $5 proxy subscription. If the answer is "too easily," you have found your biggest security gap.
Vulnerability Classes
Target Technologies
All Tags
Up Next From This Conference
Similar Talks

Counter Deception: Defending Yourself in a World Full of Lies

Tor: A Decade of Lessons




