US and Europe disrupt SocksEscort proxy network

Law enforcement agencies from the United States and Europe, supported by private partners, have taken down the SocksEscort cybercrime proxy network. This service, powered by the AVRecon malware infecting Linux-based devices, provided cybercriminals with access to compromised IP addresses. The operation resulted in the seizure of domains, servers, and cryptocurrency assets.

The disruption of the SocksEscort proxy network occurred on March 12, 2026, involving coordination between U.S. authorities, European law enforcement, and private entities like Lumen’s Black Lotus Labs (BLL).

SocksEscort operated for over a decade, first documented by BLL in 2023. It relied exclusively on edge devices compromised by the AVRecon malware, which targeted Linux-based small office/home office (SOHO) routers. AVRecon has been active since at least May 2021 and infected more than 70,000 such devices by mid-2023. The network maintained an average of 20,000 infected devices weekly in recent years, with over half located in the United States and the United Kingdom.

Since the summer of 2020, SocksEscort offered access to approximately 369,000 different IP addresses, advertised as “clean” from major ISPs including Comcast, Spectrum, Spectrum Business, Verizon, and Charter. These addresses could evade multiple blocklists. As of February 2026, the service listed about 8,000 infected routers available for customer access, including 2,500 in the United States.

The U.S. Department of Justice (DOJ) highlighted the network's role in specific crimes: it facilitated the theft of $1 million in cryptocurrency from a New York user, enabled $700,000 in losses from defrauding a Pennsylvania-based manufacturing business, and caused $100,000 in damages through fraud affecting current and former U.S. service members using MILITARY STAR cards.

In the operation, European authorities in Austria, France, and the Netherlands, coordinated by Europol, seized 34 domains and 23 servers across seven countries. The U.S. froze $3.5 million in cryptocurrency. All infected devices connected to SocksEscort have now been disconnected from the service.

Lumen's earlier efforts in 2023 disrupted AVRecon by null-routing its command-and-control infrastructure, but operators later restored functionality using 15 such nodes. Since the beginning of 2025, BLL observed 280,000 unique victim IP addresses linked solely to this malware for expanding SocksEscort.

Relaterede artikler

Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Billede genereret af AI

Iran-linked hackers disrupt Stryker's network in apparent retaliation

Rapporteret af AI Billede genereret af AI

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

Tysk politi og Europol lukkede omkring 373.000 til 400.000 darknet-sider, der solgte groft børnemisbrugsmateriale og svindel i Operation Alice. Fem svenske mænd er mistænkt for grove børnepornografiske forbrydelser efter et tip fra tysk politi. 440 kunder blev identificeret i den femårige efterforskning.

Rapporteret af AI

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Cryptocurrency transactions linked to suspected human trafficking operations reached hundreds of millions of dollars in 2025, an 85% increase from 2024, as detailed in Chainalysis's 2026 Crypto Crime Report—which documented a record $154 billion in overall illicit crypto activity. The surge is linked to Southeast Asia-based scam compounds, online gambling sites, and Chinese-language money laundering networks. Blockchain transparency aids detection amid these rising threats.

Rapporteret af AI

Iranian officials are issuing SMS warnings to citizens bypassing internet restrictions. The messages target those using VPNs or Starlink to access global web content. This comes amid a near-total internet blackout in the country.

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis