How a Belarus Company is Paying US Soldiers $200/Month for Network Access

How a Belarus Company is Paying US Soldiers $200/Month for Network Access

DSLRoot Exposed: The Questionable Belarus-Based Proxy Service Recruiting Americans to Host Network Infrastructure

Published: August 2025

Executive Summary

On 8 August 2025, an individual assessed to be located in the United States posted on a large, publicly accessible, community-driven discussion forum inquiring about the feasibility of hosting a network device on their home network for an entity identifying itself as DSLRoot. This inquiry led us down a rabbit hole that revealed a questionable operation with concerning operational security implications.

DSLRoot operates as a residential proxy provider with a limited supply, relying on US-based individuals to install hardware on their home networks in exchange for compensation. The company offers $100 USD monthly for mobile device hosting and $200 USD monthly for hardware devices they term "ASDLs" (Advanced Secure Data Links). While DSLRoot claims to be based in New York, our assessment with high confidence indicates the operation is controlled from Belarus, with additional Russian connections that make this arrangement particularly concerning. Our investigation identified active US military personnel among those participating in the compensation program, raising significant operational security implications.

Company Background and Operations

DSLRoot presents itself as a legitimate residential proxy service, but several factors raise significant red flags about their operations. The company accepts cryptocurrency payments, employs no Know Your Customer (KYC) verification processes, and while claiming they don't facilitate fraud, maintains no active monitoring or prevention mechanisms to counter malicious usage of their infrastructure.

The business model itself creates an inherent risk: American citizens, including what we've identified as active military personnel, are essentially renting out their home network infrastructure to a foreign-controlled entity. The original forum poster who brought this to our attention exhibits posting patterns consistent with an active US serviceman, highlighting how this operation has successfully recruited individuals with potential security clearances.

This arrangement bears striking similarities to the case of Christina Marie Chapman, an Arizona woman who received a 17-month federal sentence for her role in an information technology worker fraud scheme that generated illicit revenue through similar proxy infrastructure abuse.

Technical Infrastructure Analysis

DSLRoot's technical implementation reveals a sophisticated operation designed for persistent access and control. The company provides proprietary software programmed in Delphi to access hosted nodes via SOCKS5 protocols. Their ecosystem includes several applications that automatically configure major browsers including Chrome, Edge, and Firefox.

Key Technical Characteristics:

  • Embedded unique user identifiers within downloaded executables

  • SOCKS5 proxy server deployment on 127.0.0.1:3129

  • Browser modification with specific proxy configurations

  • Chrome launched with flags including: --disable-dns-over-https --enable-features="dns-over-https<DoHTrial" --force-fieldtrials="DoHTrial/Disabled" --no-first-run --disable-async-dns --proxy-server="socks5://127.0.0.1:3129"

The service provides a web-based management interface allowing customers to rotate proxies at will, displaying real-time information about active users per ASDL, geographic location data, IP change timing, and connection types. The hardware devices likely maintain persistent connectivity by automatically renewing DHCP leases from the host's ISP at regular intervals, typically every 30 minutes.

Geographic and Operational Concerns

While DSLRoot maintains they operate from New York, multiple indicators point to Belarus-based control with Russian operational connections. This assessment is made with high confidence based on:

  • Operational patterns consistent with Eastern European proxy services

  • Technical implementation using development frameworks common in the Belarus/Russian technology sector

  • Payment structures designed to avoid traditional US banking oversight

  • Lack of regulatory compliance typical of offshore-controlled operations

  • Historical connections to ezzi.net from 2014, with associated infrastructure previously used in dating fraud schemes utilizing mail.ru domains

The implications of Belarus-controlled infrastructure operating within US residential networks extend beyond simple privacy concerns. DSLRoot operates as a commercial service, advertising on platforms like BlackHatWorld and providing customer support through Telegram and email channels. This means anyone willing to pay can access distributed entry points throughout American civilian infrastructure, while the underlying control remains with a Belarus-based entity during a period of heightened geopolitical tensions.

The Broader Context

Residential proxy networks typically establish themselves through unwitting participants - users who unknowingly consent to sharing their network access by installing mobile applications with bundled SDKs designed to monetize through background proxy services. DSLRoot's approach of actively recruiting knowing participants with direct monetary compensation represents a more brazen approach to the same underlying business model.

The service is accessible to anyone willing to pay, creating a marketplace where customers can route traffic through authentic US residential IP addresses for various purposes. Legitimate use cases might include market research, content verification, or accessing geo-restricted services. However, the same infrastructure could equally serve less savory purposes such as fraud schemes, account creation abuse, or circumventing security measures - all while appearing to originate from trusted residential connections.

The lack of meaningful oversight mechanisms creates an environment ripe for abuse. Without KYC processes, customers can anonymously route any type of traffic through American residential IP addresses, providing perfect cover for a wide spectrum of activities while the actual participants remain unaware of how their network access is being utilized.

What We Found

Our investigation revealed that DSLRoot has successfully established a network of compensated American participants, including military personnel, who are providing a foreign-controlled proxy service with access to US residential network infrastructure. The combination of cryptocurrency payments, lack of verification processes, and foreign control creates a perfect storm of operational security concerns.

The $100-200 monthly compensation may seem modest, but for cash-strapped individuals, particularly younger military personnel, this represents meaningful supplemental income. The company's recruitment appears to be working effectively, as evidenced by active forum discussions and the technical sophistication of their deployment infrastructure.

Conclusion

DSLRoot represents a concerning evolution in the residential proxy space - a foreign-controlled operation that openly recruits American citizens to provide network access in exchange for direct compensation. While the business model operates in legal gray areas, the combination of Belarus-based control, Russian connections, lack of oversight, and recruitment of military personnel creates significant operational security implications that extend far beyond typical commercial proxy services.

The case highlights the broader challenges of regulating cross-border digital infrastructure and the ease with which foreign entities can establish distributed access points within US civilian networks through seemingly legitimate commercial arrangements.

DSLRoot Exposed: The Questionable Belarus-Based Proxy Service Recruiting Americans to Host Network Infrastructure

Published: August 2025

Executive Summary

On 8 August 2025, an individual assessed to be located in the United States posted on a large, publicly accessible, community-driven discussion forum inquiring about the feasibility of hosting a network device on their home network for an entity identifying itself as DSLRoot. This inquiry led us down a rabbit hole that revealed a questionable operation with concerning operational security implications.

DSLRoot operates as a residential proxy provider with a limited supply, relying on US-based individuals to install hardware on their home networks in exchange for compensation. The company offers $100 USD monthly for mobile device hosting and $200 USD monthly for hardware devices they term "ASDLs" (Advanced Secure Data Links). While DSLRoot claims to be based in New York, our assessment with high confidence indicates the operation is controlled from Belarus, with additional Russian connections that make this arrangement particularly concerning. Our investigation identified active US military personnel among those participating in the compensation program, raising significant operational security implications.

Company Background and Operations

DSLRoot presents itself as a legitimate residential proxy service, but several factors raise significant red flags about their operations. The company accepts cryptocurrency payments, employs no Know Your Customer (KYC) verification processes, and while claiming they don't facilitate fraud, maintains no active monitoring or prevention mechanisms to counter malicious usage of their infrastructure.

The business model itself creates an inherent risk: American citizens, including what we've identified as active military personnel, are essentially renting out their home network infrastructure to a foreign-controlled entity. The original forum poster who brought this to our attention exhibits posting patterns consistent with an active US serviceman, highlighting how this operation has successfully recruited individuals with potential security clearances.

This arrangement bears striking similarities to the case of Christina Marie Chapman, an Arizona woman who received a 17-month federal sentence for her role in an information technology worker fraud scheme that generated illicit revenue through similar proxy infrastructure abuse.

Technical Infrastructure Analysis

DSLRoot's technical implementation reveals a sophisticated operation designed for persistent access and control. The company provides proprietary software programmed in Delphi to access hosted nodes via SOCKS5 protocols. Their ecosystem includes several applications that automatically configure major browsers including Chrome, Edge, and Firefox.

Key Technical Characteristics:

  • Embedded unique user identifiers within downloaded executables

  • SOCKS5 proxy server deployment on 127.0.0.1:3129

  • Browser modification with specific proxy configurations

  • Chrome launched with flags including: --disable-dns-over-https --enable-features="dns-over-https<DoHTrial" --force-fieldtrials="DoHTrial/Disabled" --no-first-run --disable-async-dns --proxy-server="socks5://127.0.0.1:3129"

The service provides a web-based management interface allowing customers to rotate proxies at will, displaying real-time information about active users per ASDL, geographic location data, IP change timing, and connection types. The hardware devices likely maintain persistent connectivity by automatically renewing DHCP leases from the host's ISP at regular intervals, typically every 30 minutes.

Geographic and Operational Concerns

While DSLRoot maintains they operate from New York, multiple indicators point to Belarus-based control with Russian operational connections. This assessment is made with high confidence based on:

  • Operational patterns consistent with Eastern European proxy services

  • Technical implementation using development frameworks common in the Belarus/Russian technology sector

  • Payment structures designed to avoid traditional US banking oversight

  • Lack of regulatory compliance typical of offshore-controlled operations

  • Historical connections to ezzi.net from 2014, with associated infrastructure previously used in dating fraud schemes utilizing mail.ru domains

The implications of Belarus-controlled infrastructure operating within US residential networks extend beyond simple privacy concerns. DSLRoot operates as a commercial service, advertising on platforms like BlackHatWorld and providing customer support through Telegram and email channels. This means anyone willing to pay can access distributed entry points throughout American civilian infrastructure, while the underlying control remains with a Belarus-based entity during a period of heightened geopolitical tensions.

The Broader Context

Residential proxy networks typically establish themselves through unwitting participants - users who unknowingly consent to sharing their network access by installing mobile applications with bundled SDKs designed to monetize through background proxy services. DSLRoot's approach of actively recruiting knowing participants with direct monetary compensation represents a more brazen approach to the same underlying business model.

The service is accessible to anyone willing to pay, creating a marketplace where customers can route traffic through authentic US residential IP addresses for various purposes. Legitimate use cases might include market research, content verification, or accessing geo-restricted services. However, the same infrastructure could equally serve less savory purposes such as fraud schemes, account creation abuse, or circumventing security measures - all while appearing to originate from trusted residential connections.

The lack of meaningful oversight mechanisms creates an environment ripe for abuse. Without KYC processes, customers can anonymously route any type of traffic through American residential IP addresses, providing perfect cover for a wide spectrum of activities while the actual participants remain unaware of how their network access is being utilized.

What We Found

Our investigation revealed that DSLRoot has successfully established a network of compensated American participants, including military personnel, who are providing a foreign-controlled proxy service with access to US residential network infrastructure. The combination of cryptocurrency payments, lack of verification processes, and foreign control creates a perfect storm of operational security concerns.

The $100-200 monthly compensation may seem modest, but for cash-strapped individuals, particularly younger military personnel, this represents meaningful supplemental income. The company's recruitment appears to be working effectively, as evidenced by active forum discussions and the technical sophistication of their deployment infrastructure.

Conclusion

DSLRoot represents a concerning evolution in the residential proxy space - a foreign-controlled operation that openly recruits American citizens to provide network access in exchange for direct compensation. While the business model operates in legal gray areas, the combination of Belarus-based control, Russian connections, lack of oversight, and recruitment of military personnel creates significant operational security implications that extend far beyond typical commercial proxy services.

The case highlights the broader challenges of regulating cross-border digital infrastructure and the ease with which foreign entities can establish distributed access points within US civilian networks through seemingly legitimate commercial arrangements.

DSLRoot Exposed: The Questionable Belarus-Based Proxy Service Recruiting Americans to Host Network Infrastructure

Published: August 2025

Executive Summary

On 8 August 2025, an individual assessed to be located in the United States posted on a large, publicly accessible, community-driven discussion forum inquiring about the feasibility of hosting a network device on their home network for an entity identifying itself as DSLRoot. This inquiry led us down a rabbit hole that revealed a questionable operation with concerning operational security implications.

DSLRoot operates as a residential proxy provider with a limited supply, relying on US-based individuals to install hardware on their home networks in exchange for compensation. The company offers $100 USD monthly for mobile device hosting and $200 USD monthly for hardware devices they term "ASDLs" (Advanced Secure Data Links). While DSLRoot claims to be based in New York, our assessment with high confidence indicates the operation is controlled from Belarus, with additional Russian connections that make this arrangement particularly concerning. Our investigation identified active US military personnel among those participating in the compensation program, raising significant operational security implications.

Company Background and Operations

DSLRoot presents itself as a legitimate residential proxy service, but several factors raise significant red flags about their operations. The company accepts cryptocurrency payments, employs no Know Your Customer (KYC) verification processes, and while claiming they don't facilitate fraud, maintains no active monitoring or prevention mechanisms to counter malicious usage of their infrastructure.

The business model itself creates an inherent risk: American citizens, including what we've identified as active military personnel, are essentially renting out their home network infrastructure to a foreign-controlled entity. The original forum poster who brought this to our attention exhibits posting patterns consistent with an active US serviceman, highlighting how this operation has successfully recruited individuals with potential security clearances.

This arrangement bears striking similarities to the case of Christina Marie Chapman, an Arizona woman who received a 17-month federal sentence for her role in an information technology worker fraud scheme that generated illicit revenue through similar proxy infrastructure abuse.

Technical Infrastructure Analysis

DSLRoot's technical implementation reveals a sophisticated operation designed for persistent access and control. The company provides proprietary software programmed in Delphi to access hosted nodes via SOCKS5 protocols. Their ecosystem includes several applications that automatically configure major browsers including Chrome, Edge, and Firefox.

Key Technical Characteristics:

  • Embedded unique user identifiers within downloaded executables

  • SOCKS5 proxy server deployment on 127.0.0.1:3129

  • Browser modification with specific proxy configurations

  • Chrome launched with flags including: --disable-dns-over-https --enable-features="dns-over-https<DoHTrial" --force-fieldtrials="DoHTrial/Disabled" --no-first-run --disable-async-dns --proxy-server="socks5://127.0.0.1:3129"

The service provides a web-based management interface allowing customers to rotate proxies at will, displaying real-time information about active users per ASDL, geographic location data, IP change timing, and connection types. The hardware devices likely maintain persistent connectivity by automatically renewing DHCP leases from the host's ISP at regular intervals, typically every 30 minutes.

Geographic and Operational Concerns

While DSLRoot maintains they operate from New York, multiple indicators point to Belarus-based control with Russian operational connections. This assessment is made with high confidence based on:

  • Operational patterns consistent with Eastern European proxy services

  • Technical implementation using development frameworks common in the Belarus/Russian technology sector

  • Payment structures designed to avoid traditional US banking oversight

  • Lack of regulatory compliance typical of offshore-controlled operations

  • Historical connections to ezzi.net from 2014, with associated infrastructure previously used in dating fraud schemes utilizing mail.ru domains

The implications of Belarus-controlled infrastructure operating within US residential networks extend beyond simple privacy concerns. DSLRoot operates as a commercial service, advertising on platforms like BlackHatWorld and providing customer support through Telegram and email channels. This means anyone willing to pay can access distributed entry points throughout American civilian infrastructure, while the underlying control remains with a Belarus-based entity during a period of heightened geopolitical tensions.

The Broader Context

Residential proxy networks typically establish themselves through unwitting participants - users who unknowingly consent to sharing their network access by installing mobile applications with bundled SDKs designed to monetize through background proxy services. DSLRoot's approach of actively recruiting knowing participants with direct monetary compensation represents a more brazen approach to the same underlying business model.

The service is accessible to anyone willing to pay, creating a marketplace where customers can route traffic through authentic US residential IP addresses for various purposes. Legitimate use cases might include market research, content verification, or accessing geo-restricted services. However, the same infrastructure could equally serve less savory purposes such as fraud schemes, account creation abuse, or circumventing security measures - all while appearing to originate from trusted residential connections.

The lack of meaningful oversight mechanisms creates an environment ripe for abuse. Without KYC processes, customers can anonymously route any type of traffic through American residential IP addresses, providing perfect cover for a wide spectrum of activities while the actual participants remain unaware of how their network access is being utilized.

What We Found

Our investigation revealed that DSLRoot has successfully established a network of compensated American participants, including military personnel, who are providing a foreign-controlled proxy service with access to US residential network infrastructure. The combination of cryptocurrency payments, lack of verification processes, and foreign control creates a perfect storm of operational security concerns.

The $100-200 monthly compensation may seem modest, but for cash-strapped individuals, particularly younger military personnel, this represents meaningful supplemental income. The company's recruitment appears to be working effectively, as evidenced by active forum discussions and the technical sophistication of their deployment infrastructure.

Conclusion

DSLRoot represents a concerning evolution in the residential proxy space - a foreign-controlled operation that openly recruits American citizens to provide network access in exchange for direct compensation. While the business model operates in legal gray areas, the combination of Belarus-based control, Russian connections, lack of oversight, and recruitment of military personnel creates significant operational security implications that extend far beyond typical commercial proxy services.

The case highlights the broader challenges of regulating cross-border digital infrastructure and the ease with which foreign entities can establish distributed access points within US civilian networks through seemingly legitimate commercial arrangements.

In this post:

In this post:

In this post:

Section

Section

Section

Join the FREE Beta Now!

150M daily indicators—from malware C2s to residential proxy networks.

The Infrawatch platform delivers real-time, internet-wide scanning, providing the critical context you need for investigations and risk mitigation from threat actors. Stay ahead of adversaries with live intelligence. Join our Beta now!