{"id":228360,"date":"2024-11-20T15:08:38","date_gmt":"2024-11-20T14:08:38","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=228360"},"modified":"2026-01-22T13:40:25","modified_gmt":"2026-01-22T13:40:25","slug":"prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/","title":{"rendered":"PROSPERO &amp; Proton66: Uncovering the links between bulletproof networks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"228360\" class=\"elementor elementor-228360\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a921ea e-flex e-con-boxed e-con e-parent\" data-id=\"57a921ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3da6d9f3 elementor-widget elementor-widget-text-editor\" data-id=\"3da6d9f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Key findings<\/h2><p>\u00a0<\/p><p>This report presents:<\/p><ul><li>The Russian autonomous system <strong><em>PROSPERO<\/em> (AS200593)<\/strong> could be linked with a high level of confidence to <strong><em>Proton66 <\/em>(AS198953)<\/strong>, another Russian AS, that we believe to be connected to the <strong>bulletproof services<\/strong> named &#039;\u2018<span style=\"font-weight: normal !msorm;\"><strong>SecureHost<\/strong><\/span>\u2018&#039; and &#039;\u2018<strong>BEARHOST<\/strong>\u2018&#039;. We notably observed that both network&#039;s configurations are almost identical in terms of peering agreements and their respective share of loads throughout time.<\/li><li>Amongst the activities shared by the two networks, we noticed that both <strong>GootLoader<\/strong> and <strong>SpyNote<\/strong> malware recently changed their infrastructure <strong>command-and-control servers<\/strong> and <strong>phishing pages<\/strong> from to <em>Proton66<\/em>. Additionally, the domains hosting the phishing pages deploying SpyNote were hosted on either one of the two AS and had already been used in previous campaigns delivering <strong>revoked AnyDesk <\/strong>and <strong>LiveChat<\/strong> <strong>versions<\/strong> for both <strong>Windows<\/strong> and <strong>Mac<\/strong>.<\/li><li>Regarding the other malicious activities found on <em>PROSPERO<\/em>\u2019&#039;s IPs, we found that throughout September, multiple <strong>SMS spam campaigns<\/strong> targeting citizens from various countries were leading to phishing domains hosted on <em>PROSPERO <\/em>and <em>Proton66<\/em>. While most phishing templates were <span style=\"font-weight: normal !msorm;\"><strong>usurpation <\/strong><\/span><strong>bank login pages<\/strong> to steal credit card details, we also noticed that some of them were used to deploy <strong>android spyware<\/strong> such <strong>Coper<\/strong> (aka. <strong>Octo<\/strong>).<\/li><li><strong>SocGholish<\/strong>, another <strong>Initial Access Broker (IAB)<\/strong> that we found to be hosting a major part of its infrastructure on <em>Proton66<\/em>, continue to leverage this autonomous system to host <strong>fingerprinting scripts <\/strong>contained on the websites it infects. Along SocGholish, we found out that <strong>FakeBat<\/strong>, another loader that infects systems through compromised websites, was using the <strong>same IPs <\/strong>to host both screening and redirection scripts.<\/li><\/ul><h2>\u00a0<\/h2><h2>Introduction<\/h2><p>\u00a0<\/p><p style=\"text-align: justify;\">In the continuity of our constant monitoring of bulletproof networks, we discovered <span style=\"font-weight: normal !msorm;\"><strong>a<\/strong><\/span><strong>n <\/strong><span style=\"font-weight: normal !msorm;\"><strong>autonomous system named <i><\/i><i><em>PROSPERO<\/em><\/i><i><em> OOO<\/em><\/i><\/strong><\/span><span style=\"font-weight: normal !msorm;\"><strong> (AS200593)<\/strong><\/span> based in <span style=\"font-weight: normal !msorm;\"><strong>Russia<\/strong><\/span>. We believe that it could be linked to <span style=\"font-weight: normal !msorm;\"><strong><em><i>Proton66 OOO <\/i><\/em><\/strong><\/span><span style=\"font-weight: normal !msorm;\"><strong>(AS198953)<\/strong><\/span>, another Russian and anonymous autonomous system that we previously found to be connected to a bigger infrastructure composed of multiple AS and offshore companies all operated by a common Russian national. This individual notably promotes its bulletproof hosting businesses named &#039;\u2018<strong>UNDERGROUND<\/strong>\u2018&#039; and &#039;\u2018<strong>BEARHOST<\/strong>\u2018&#039; on various Russian-speaking underground marketplaces stating that the service is \u201c<span style=\"font-style: normal !msorm;\"><em>100% bulletproof <\/em><\/span><span style=\"font-style: normal !msorm;\"><em>[\u2026] we completely ignore all abuses and complaints, including Spamhaus<\/em><\/span>\u201d&quot;He notably used to work with another bulletproof provider named &#039;\u2018<span style=\"font-weight: normal !msorm;\"><strong>SecureHost<\/strong><\/span>\u2018&#039;, advertised on the same underground platforms that we believe with a high level of confidence to be the present operator of both <span style=\"font-style: normal !msorm;\"><em>PROSPERO OOO<\/em><\/span> and <span style=\"font-style: normal !msorm;\"><em>Proton66 OOO<\/em><\/span>.<\/p><table width=\"604\"><tbody><tr><td width=\"604\"><p style=\"text-align: justify;\"><strong>Bulletproof hosting<\/strong><\/p><p style=\"text-align: justify;\">A bulletproof hosting service is a type of web hosting service known for offering <strong>high levels of privacy<\/strong>, security, and <strong>leniency <\/strong>regarding the content and activities allowed on their servers. These services typically provide robust protection against <strong>takedown requests<\/strong>, <strong>legal actions<\/strong>, and <strong>law<\/strong> <strong>enforcement investigations<\/strong>, often by locating their servers in jurisdictions with <strong>minimal regulations<\/strong> or weak enforcement of international laws. Bulletproof hosting is often associated with <strong>hosting illicit content<\/strong> or activities, such as <strong>malware distribution<\/strong>, <strong>spam operations<\/strong>, gold <strong>copyright-infringing materials<\/strong>, due to its permissive stance and commitment to client confidentiality. However, it&#039;s important to note that not all uses of such services are illegal, as some users may seek such hosting for <strong>legitimate privacy concerns<\/strong>.<\/p><\/td><\/tr><\/tbody><\/table><p style=\"text-align: justify;\">The connection between <em>PROSPERO<\/em> and <em>Proton66<\/em> could be made through similarities in the way both networks are operated, notably in their respective peering agreements shared with other Russian networks. Additionally, we noticed that botnets operated by <strong>GootLoader<\/strong>, an initial access broker, and <strong>SpyNote<\/strong>, an android RAT, had moved their infrastructure from <em>PROSPERO <\/em>to <em>Proton66<\/em>, or would sometimes host their command-and-control servers on both AS. Along those finds, this report aims to provide an overview of all the malicious activities that are hosted on <em>PROSPERO OOO<\/em>.<\/p><table width=\"604\"><tbody><tr><td width=\"604\"><p><strong>Legal format of Russian companies<\/strong><\/p><p>As a reminder, the Russian format \u201c<strong>OOO<\/strong>\u201dstands for\u201c<strong>Obschestvo s Ogranichennoy Otvetstvennostyu<\/strong>\u201d which corresponds to the Anglo-Saxon format \u201c<strong>LLC<\/strong>\u201d&quot; gold &quot;\u201c<strong>limited liability company<\/strong>\u201d.<\/p><\/td><\/tr><\/tbody><\/table><h2>Intrinsec&#039;s CTI services<\/h2><p>\u00a0<\/p><p style=\"text-align: justify;\">Organizations are facing a rise in the sophistication of threat actors and intrusion sets. To address these evolving threats, it is now necessary to take a proactive approach in the detection and analysis of any element deemed malicious. Such a hands-on approach allows companies to anticipate, or at least react as quickly as possible to the compromises they face.<\/p><p style=\"text-align: justify;\">For this report, shared with our clients in July 2023, Intrinsec relied on its Cyber Threat Intelligence service, which provides its customers with high value-added, contextualized and actionable intelligence to understand and contain cyber threats. Our CTI team consolidates data &amp; information gathered from our security monitoring services (SOC, MDR, etc.), our incident response team (CERT-Intrinsec) and custom cyber intelligence generated by our analysts using custom heuristics, honeypots, hunting, reverse-engineering &amp; pivots.<\/p><p style=\"text-align: justify;\">Intrinsec also offers various services around Cyber Threat Intelligence:<\/p><ul style=\"text-align: justify;\"><li>Risk anticipation: which can be leveraged to continuously adapt the detection &amp; response capabilities of our clients&#039; existing tools (EDR, XDR, SIEM, \u2026) through:<ul><li style=\"list-style-type: none;\"><ul><li><strong>an operational feed of IOCs based on our exclusive activities.<\/strong><\/li><li><strong>threat intel notes &amp; reports, TIP-compliant.<\/strong><\/li><\/ul><\/li><\/ul><\/li><li>Digital risk monitoring:<ul><li style=\"list-style-type: none;\"><ul><li><strong>data leak detection &amp; remediation<\/strong><\/li><li><strong>external asset security monitoring (EASM)<\/strong><\/li><li><strong>brand protection<\/strong><\/li><\/ul><\/li><\/ul><\/li><\/ul><p style=\"text-align: justify;\">For more information, go to <a href=\"http:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence\/\">our CTI&#039;s website<\/a><\/p><p style=\"text-align: justify;\">Follow us on <a href=\"https:\/\/www.linkedin.com\/company\/intrinsec\/\">LinkedIn<\/a> and <a href=\"https:\/\/twitter.com\/Intrinsec\">X<\/a>]<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a5a30a e-flex e-con-boxed e-con e-parent\" data-id=\"8a5a30a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49b1aef elementor-widget elementor-widget-button\" data-id=\"49b1aef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2024\/11\/TLP-CLEAR-PROSPERO-Proton66-Uncovering-the-links-between-bulletproof-networks.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the report<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Key findings This report presents: The Russian autonomous system PROSPERO (AS200593) could be linked [\u2026]<\/p>","protected":false},"author":42,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,11],"tags":[],"class_list":["post-228360","post","type-post","status-publish","format-standard","hentry","category-cyber-threat-intelligence","category-threat-intelligence-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PROSPERO &amp; Proton66: Uncovering the links between bulletproof networks - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PROSPERO &amp; Proton66: Uncovering the links between bulletproof networks\" \/>\n<meta property=\"og:description\" content=\"Key findings \u00a0 This report presents: The Russian autonomous system PROSPERO (AS200593) could be linked [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T14:08:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T13:40:25+00:00\" \/>\n<meta name=\"author\" content=\"David Sardinha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Sardinha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/\"},\"author\":{\"name\":\"David Sardinha\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/eef66c6c32d58bdf5504aa413ee51657\"},\"headline\":\"PROSPERO &#038; Proton66: Uncovering the links between bulletproof networks\",\"datePublished\":\"2024-11-20T14:08:38+00:00\",\"dateModified\":\"2026-01-22T13:40:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/\"},\"wordCount\":854,\"articleSection\":[\"Cyber Threat Intelligence\",\"Threat Intelligence Report\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/\",\"name\":\"PROSPERO & Proton66: Uncovering the links between bulletproof networks - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"datePublished\":\"2024-11-20T14:08:38+00:00\",\"dateModified\":\"2026-01-22T13:40:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/eef66c6c32d58bdf5504aa413ee51657\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PROSPERO &#038; Proton66: Uncovering the links between bulletproof networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/eef66c6c32d58bdf5504aa413ee51657\",\"name\":\"David Sardinha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a806293ca946422859e96a7bb19eac8e5bf3e1625b9a15074f8ddb04542ea818?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a806293ca946422859e96a7bb19eac8e5bf3e1625b9a15074f8ddb04542ea818?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a806293ca946422859e96a7bb19eac8e5bf3e1625b9a15074f8ddb04542ea818?s=96&d=retro&r=g\",\"caption\":\"David Sardinha\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/david-sardinha\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PROSPERO &amp; Proton66: Uncovering the links between bulletproof networks - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/","og_locale":"en_US","og_type":"article","og_title":"PROSPERO & Proton66: Uncovering the links between bulletproof networks","og_description":"Key findings \u00a0 This report presents: The Russian autonomous system PROSPERO (AS200593) could be linked [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/","og_site_name":"INTRINSEC","article_published_time":"2024-11-20T14:08:38+00:00","article_modified_time":"2026-01-22T13:40:25+00:00","author":"David Sardinha","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Sardinha","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/"},"author":{"name":"David Sardinha","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/eef66c6c32d58bdf5504aa413ee51657"},"headline":"PROSPERO &#038; Proton66: Uncovering the links between bulletproof networks","datePublished":"2024-11-20T14:08:38+00:00","dateModified":"2026-01-22T13:40:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/"},"wordCount":854,"articleSection":["Cyber Threat Intelligence","Threat Intelligence Report"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/","url":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/","name":"PROSPERO &amp; Proton66: Uncovering the links between bulletproof networks - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"datePublished":"2024-11-20T14:08:38+00:00","dateModified":"2026-01-22T13:40:25+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/eef66c6c32d58bdf5504aa413ee51657"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"PROSPERO &#038; Proton66: Uncovering the links between bulletproof networks"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/eef66c6c32d58bdf5504aa413ee51657","name":"David Sardinha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a806293ca946422859e96a7bb19eac8e5bf3e1625b9a15074f8ddb04542ea818?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a806293ca946422859e96a7bb19eac8e5bf3e1625b9a15074f8ddb04542ea818?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a806293ca946422859e96a7bb19eac8e5bf3e1625b9a15074f8ddb04542ea818?s=96&d=retro&r=g","caption":"David Sardinha"},"url":"https:\/\/www.intrinsec.com\/en\/author\/david-sardinha\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=228360"}],"version-history":[{"count":5,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228360\/revisions"}],"predecessor-version":[{"id":231335,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228360\/revisions\/231335"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=228360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=228360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=228360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}