This can result from misconfiguration of proxy software running on the computer, or from infection with malware (viruses, trojans or worms) designed for this purpose.
In addition, greynet applications often open the door for end use systems to become compromised by additional applications, security risks and malware.