SocksEscort Proxy Network Disrupted by Law Enforcement
Summary
Hide ▲
Show ▼
Law enforcement agencies in the U.S. and Europe, along with private partners, have disrupted the SocksEscort cybercrime proxy network. This network relied on edge devices compromised by the AVRecon malware for Linux. The disruption involved taking down multiple servers and domains, freezing cryptocurrency, and disconnecting infected devices. The network had been active for over a decade, offering access to 'clean' IP addresses from major ISPs and facilitating various fraudulent activities. The SocksEscort network had an average of 20,000 infected devices weekly and was used in several high-value fraud cases, including the theft of $1 million in cryptocurrency and losses of $700,000 from a Pennsylvania-based manufacturing business. The network offered access to about 369,000 different IP addresses in 163 countries since summer 2020, with the service listing nearly 8,000 infected routers as of February 2026. The compromised devices were infected through a vulnerability in the residential modems of a specific brand. International law enforcement partners executed Operation Lightning to dismantle the SocksEscort proxy service, which compromised over 360,000 routers and IoT devices in 163 countries since 2020. The operation involved seizing 34 domains and 23 servers in seven countries, freezing $3.5 million in cryptocurrency, and disconnecting all infected devices. The malware enabled various criminal activities, including ransomware, DDoS attacks, and the distribution of child sexual abuse material (CSAM). The payment platform for SocksEscort received almost $6 million from proxy service customers.
Timeline
-
12.03.2026 18:19 3 articles · 1d ago
Law Enforcement Disrupts SocksEscort Proxy Network
Law enforcement agencies in the U.S. and Europe, along with private partners, have disrupted the SocksEscort cybercrime proxy network. The network relied on edge devices compromised by the AVRecon malware for Linux. The disruption involved taking down multiple servers and domains, freezing cryptocurrency, and disconnecting infected devices. The network had been active for over a decade, offering access to 'clean' IP addresses from major ISPs and facilitating various fraudulent activities. The AVRecon malware, which powered SocksEscort, was believed to have been active since at least May 2021 and infected over 70,000 Linux-based SOHO routers by mid-2023. Despite previous disruptions, the operators of SocksEscort returned to regular operations, routing communications through 15 command-and-control nodes (C2s). SocksEscort offered access to about 369,000 different IP addresses in 163 countries since summer 2020. As of December 2025, SocksEscort's website claimed to offer 'static residential IPs with unlimited bandwidth' and advertised over 35,900 proxies from 102 countries. The compromised devices were infected through a vulnerability in the residential modems of a specific brand. International law enforcement partners executed Operation Lightning to dismantle the SocksEscort proxy service, which compromised over 360,000 routers and IoT devices in 163 countries since 2020. The operation involved seizing 34 domains and 23 servers in seven countries, freezing $3.5 million in cryptocurrency, and disconnecting all infected devices. The malware enabled various criminal activities, including ransomware, DDoS attacks, and the distribution of child sexual abuse material (CSAM). The payment platform for SocksEscort received almost $6 million from proxy service customers.
Show sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
Information Snippets
-
SocksEscort was first documented by Lumen’s Black Lotus Labs (BLL) in 2023 and had been operational for over a decade.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The network offered access to 'clean' IP addresses from major ISPs such as Comcast, Spectrum, Verizon, and Charter.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
SocksEscort advertised access to about 369,000 different IP addresses since summer 2020.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
As of February 2026, the SocksEscort application listed approximately 8,000 infected routers, with 2,500 in the United States.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The service was used in the theft of $1 million in cryptocurrency, $700,000 in losses from a Pennsylvania-based manufacturing business, and $100,000 in damages impacting U.S. service members.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
European authorities in Austria, France, and the Netherlands took down multiple SocksEscort servers under the coordination of Europol.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
Law enforcement seized 34 domains and 23 servers located in seven countries, and the U.S. froze $3.5 million in cryptocurrency.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
All infected devices used in the SocksEscort proxy network have been disconnected from the service.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The AVRecon malware, believed to have been active since at least May 2021, infected over 70,000 Linux-based SOHO routers by mid-2023.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
Lumen researchers disrupted the AVRecon router botnet in 2023 by null-routing the command-and-control (C2) infrastructure.
First reported: 12.03.2026 18:193 sources, 3 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
SocksEscort used only the AVRecon malware to add new nodes, with 280,000 unique victim IP addresses observed since the beginning of 2025.
First reported: 12.03.2026 18:192 sources, 2 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
-
Over half of the infected devices were located in the United States and the United Kingdom.
First reported: 12.03.2026 18:192 sources, 2 articlesShow sources
- US disrupts SocksEscort proxy network powered by Linux malware — www.bleepingcomputer.com — 12.03.2026 18:19
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
SocksEscort offered access to about 369,000 different IP addresses in 163 countries since summer 2020.
First reported: 13.03.2026 07:262 sources, 2 articlesShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
As of December 2025, SocksEscort's website claimed to offer 'static residential IPs with unlimited bandwidth' and advertised over 35,900 proxies from 102 countries.
First reported: 13.03.2026 07:262 sources, 2 articlesShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The compromised devices were infected through a vulnerability in the residential modems of a specific brand.
First reported: 13.03.2026 07:262 sources, 2 articlesShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The payment platform for SocksEscort received more than EUR 5 million from proxy service customers.
First reported: 13.03.2026 07:261 source, 1 articleShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
-
AVRecon malware targets approximately 1,200 device models manufactured by Cisco, D-Link, Hikvision, Mikrotik, Netgear, TP-Link, and Zyxel.
First reported: 13.03.2026 07:261 source, 1 articleShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
-
AVRecon malware is written in the C language and primarily targets MIPS and ARM devices.
First reported: 13.03.2026 07:261 source, 1 articleShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
-
The threat actors used the device's built-in update mechanism to flash a custom firmware image containing a copy of AVRecon.
First reported: 13.03.2026 07:261 source, 1 articleShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
-
The modified firmware disables the device's update and flashing features, causing the devices to be permanently infected.
First reported: 13.03.2026 07:261 source, 1 articleShow sources
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries — thehackernews.com — 13.03.2026 07:26
-
SocksEscort compromised over 360,000 routers and IoT devices in 163 countries since 2020.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
SocksEscort offered over 35,000 proxies in recent years.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
As of February 2026, the SocksEscort application listed approximately 8,000 infected routers, with 2,500 in the United States.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The malware allowed SocksEscort to direct internet traffic through the infected routers, which belonged to both businesses and individuals globally.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
SocksEscort enabled other criminal activities, including ransomware, distributed denial-of-service (DDoS) attacks, and the distribution of child sexual abuse material (CSAM).
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The payment platform for SocksEscort received almost $6 million from proxy service customers.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
Law enforcement agencies involved in Operation Lightning included those from the US, Austria, France, and the Netherlands.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
The European Union Agency for Criminal Justice, Eurojust, was also involved.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
-
Lumen Technologies' Black Lotus Labs and the Shadowserver Foundation both provided assistance during the investigation and operation.
First reported: 13.03.2026 12:001 source, 1 articleShow sources
- Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning — www.infosecurity-magazine.com — 13.03.2026 12:00
Similar Happenings
Europol Disrupts $55m in Cryptocurrency Linked to Online Piracy
A coordinated operation led by Europol, the European Union Intellectual Property Office, and Spain’s National Police targeted online intellectual property violations. The operation identified 69 sites, traced $55m in cryptocurrency flows, and disrupted 25 illicit IPTV services by collaborating with crypto service providers. The initiative also emphasized the growing use of cryptocurrency by criminals and the importance of international cooperation in combating digital piracy.
International Law Enforcement Disrupts Rhadamanthys, VenomRAT, and Elysium Malware Operations
Law enforcement agencies from 11 countries, coordinated by Europol and Eurojust, disrupted operations of Rhadamanthys infostealer, VenomRAT, and Elysium botnet malware as part of Operation Endgame 3.0. The action, which occurred between November 10 and 13, 2025, involved seizing over 1,000 servers and 20 domains, arresting a key suspect in Greece, and uncovering millions of stolen credentials. The operation also involved multiple private cybersecurity partners. The dismantled infrastructure included hundreds of thousands of infected computers, with the main suspect behind Rhadamanthys having access to over 100,000 crypto wallets worth millions of euros. Victims were often unaware of their systems' infections. The latest version of Rhadamanthys added support for collecting device and web browser fingerprints, along with incorporating several mechanisms to fly under the radar. Additionally, the Dutch police seized around 250 physical servers and thousands of virtual servers used by a bulletproof hosting service, which has been involved in over 80 cybercrime investigations since 2022. The seized servers were located in data centers in The Hague and Zoetermeer.
International Law Enforcement Dismantles Credit Card Fraud Networks
International authorities have dismantled three large-scale credit card fraud and money laundering networks in Operation Chargeback. The operation targeted 44 suspects, including American, Austrian, Canadian, Danish, Dutch, German, and Lithuanian nationals, and resulted in the arrest of 18 individuals. The fraud networks affected over 4.3 million cardholders across 193 countries, causing losses exceeding €300 million. The operation involved over 60 searches and the execution of 18 arrest warrants. The fraudsters created over 19 million fake online subscriptions for services like pornography, dating, and streaming. They disguised monthly charges of about €50 to avoid detection. The operation was led by the Cybercrime Department of the General Prosecutor’s Office in Koblenz and the German Federal Criminal Police Office, supported by Europol and Eurojust. Authorities seized assets worth over €35 million, including luxury vehicles, cryptocurrency, and electronic devices. The suspects face accusations of organized computer fraud, membership in a criminal group, and money laundering. The fraudsters abused four major German payment service providers to launder proceeds, with six employees allegedly helping the fraudsters in exchange for fees. The suspects concealed their activities through numerous shell companies obtained through crime-as-a-service providers, primarily registered in the UK and Cyprus. The estimated attempted damages from the fraud schemes surpass €750 million (~$865 million).
Large-scale Africa-wide cybercrime crackdown arrests over 1,200 suspects
Operation Serengeti 2.0, an INTERPOL-led international operation, resulted in the arrest of 1,209 cybercriminals across Africa. The operation targeted cross-border cybercrime gangs involved in ransomware, online scams, and business email compromise (BEC). The operation, conducted from June to August 2025, involved law enforcement from 18 African countries and the UK. Authorities seized $97.4 million and dismantled 11,432 malicious infrastructures linked to attacks on 88,000 victims worldwide. Following this, Operation Sentinel, conducted between October 27 and November 27, 2025, led to the arrest of 574 individuals and the recovery of $3 million linked to business email compromise, extortion, and ransomware incidents. The operation took down more than 6,000 malicious links and decrypted six distinct ransomware variants. The cybercrime cases investigated are connected to more than $21 million in financial losses. Most recently, Operation Red Card 2.0, conducted between December 8, 2025, and January 30, 2026, resulted in the arrest of 651 suspects and the recovery of over $4.3 million. The operation targeted investment fraud, mobile money scams, and fake loan applications, identifying 1,247 victims and seizing 2,341 devices and 1,442 malicious websites, domains, and servers. The operation involved law enforcement agencies from 16 African countries: Angola, Benin, Cameroon, Côte d'Ivoire, Chad, Gabon, Gambia, Ghana, Kenya, Namibia, Nigeria, Rwanda, Senegal, Uganda, Zambia, and Zimbabwe. The operations were supported by data from private sector partners, including Cybercrime Atlas, Fortinet, Group-IB, Kaspersky, The Shadowserver Foundation, Team Cymru, Trend Micro, TRM Labs, and Uppsala Security. Cybercrime now accounts for 30% of all reported crime in Western and Eastern Africa and is increasing rapidly elsewhere on the continent. Interpol's 2025 Africa Cyberthreat Assessment Report noted that two-thirds of African member countries claim cyber-related offenses now account for a 'medium-to-high' (i.e., 10-30% or 30%+) share of all crimes. Interpol director of cybercrime, Neal Jetton, warned that the scale and sophistication of cyber-attacks across Africa are accelerating, especially against critical sectors like finance and energy. Additionally, Operation Synergia III, conducted between July 2025 and January 2026, involved authorities from 72 countries. The operation resulted in 94 arrests and 110 suspects under investigation. Police in Togo arrested 10 suspects operating a fraud ring involving social media hacking, romance scams, and sextortion. Bangladeshi police arrested 40 suspects and seized 134 electronic devices related to loan scams, job scams, identity theft, and credit card fraud. Chinese investigators in Macau identified over 33,000 phishing and fraudulent websites impersonating casinos, banks, government sites, and payment services.
UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
Microsoft and Malwarebytes have disclosed a **DNS-based ClickFix variant** that marks the first documented use of the `nslookup` command to stage and deliver malicious payloads. This technique abuses DNS queries to retrieve a PowerShell script embedded in the `NAME:` field of a DNS response from an attacker-controlled server (**84[.]21.189[.]20**), which then deploys **ModeloRAT** via a Python runtime and VBScript persistence mechanism. The attack chain begins with fake CAPTCHA lures, followed by social engineering tactics (e.g., fake system alerts, browser crashes, or instructional videos) to coerce victims into executing the `nslookup` command, which downloads a ZIP archive containing the final payload. This evolution builds on earlier ClickFix tactics, including **ConsentFix** (Azure CLI OAuth abuse), **CrashFix** (malicious Chrome extensions triggering browser crashes), and **SyncAppvPublishingServer.vbs** (Google Calendar dead drops). The latest DNS-based approach demonstrates the campaign’s adaptability, leveraging **trusted native tools** (`nslookup`), **DNS as a C2 channel**, and **psychological manipulation** (urgency tactics) to bypass security controls. Concurrently, ClickFix campaigns continue to expand with **cross-platform targeting** (Windows/Linux/macOS), **AI platform abuse** (ChatGPT, Grok, Claude), and **weaponized SaaS infrastructure** (Google Groups, Pastebin) to distribute payloads like **Lumma Stealer** and **Odyssey Stealer**. The integration of **DNS staging**, **browser-native execution**, and **multi-stage loaders** underscores the campaign’s resilience despite 2025 law enforcement disruptions, with actors refining tradecraft to maximize evasion via **social engineering**, **steganography**, and **legitimate service abuse**.